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", 0x1000}}, 0x1006) 13:42:50 executing program 2: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') read$char_usb(r0, &(0x7f0000000100)=""/128, 0x20000180) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) 13:42:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='d\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000c00000018000180140002006970766c616e310000000000000000003800038008000200000000002c0003801800018004000300080001001f00000004000300040003"], 0x64}}, 0x0) 13:42:50 executing program 5: inotify_init() select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x8}, 0x0, 0x0) 13:42:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB='d\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000c00000018000180140002006970766c616e310000000000000000003800038008000200000000002c0003801800018004000300080001001f00000004000300040003"], 0x64}}, 0x0) 13:42:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/ip_tables_names\x00') read$char_usb(r0, &(0x7f0000000100)=""/128, 0x80) 13:42:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}}) 13:42:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:51 executing program 4: r0 = getpid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xfffffffe}) 13:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffff}]}]}, 0x58}}, 0x0) 13:42:51 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a"], 0x38}}, 0x0) 13:42:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 362.153250][T12275] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 13:42:51 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{0x0, 0x0, 0x0}, 0x4a6}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x2) 13:42:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) 13:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:51 executing program 3: mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) 13:42:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab32"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 362.435414][T12290] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 13:42:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x2800) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 13:42:52 executing program 5: mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x20071, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4084071, 0xffffffffffffffff, 0x0) 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x12, 0x0, &(0x7f0000000140)) 13:42:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:52 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in=@remote, @in6=@empty, 0x0, 0x4}}]}, 0x38}, 0x8}, 0x0) 13:42:52 executing program 5: mmap$perf(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) [ 362.699246][T12308] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 13:42:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4$packet(r0, 0x0, 0x0, 0x0) 13:42:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024001d0f332aba000000000000000000", @ANYRES32, @ANYBLOB="000000000000ffff000000000c000100696e6772657373"], 0x30}}, 0x0) 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e5"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x404, 0xffffffff, 0x0, 0x1b4, 0x1b4, 0xffffffff, 0xffffffff, 0x33c, 0x33c, 0x33c, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private0, @rand_addr=' \x01\x00', [], [], 'dummy0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa4, 0xec}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'macvlan1\x00'}}}, {{@ipv6={@loopback, @rand_addr=' \x01\x00', [], [], 'ip6tnl0\x00', 'rose0\x00'}, 0x0, 0x164, 0x188, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "7e3542c4bd4a6b6f7fd7dc7908485915dc7b85913177727721ca740d85b8e543abc29baf2a5b65515c4500a72017a9d1b732d1f5509bcd4b1f9a078c1c45b6272071b9df25529e0b128ee692eac7699cd9d39fee54f936bf96c123110f5450365acec0bb416488b4fe3dfa8fa84658db61c27399d3ec273bceb771d60d0b03d4", 0x1, 0x3}}]}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x460) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="8c7cec42630e", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f000", 0x0, 0x3a, 0x0, @private1, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @local}}}}}}, 0x0) 13:42:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:52 executing program 3: mmap$perf(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) 13:42:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffff}]}]}, 0x54}}, 0x0) 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:52 executing program 2: mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x800001, 0x2071, 0xffffffffffffffff, 0x0) 13:42:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af5be11726970f935040a62f221649c485db90797577e25d3f7a90000000000000000000816b"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:52 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) timer_delete(0x0) 13:42:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:52 executing program 5: mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000004, 0x2071, 0xffffffffffffffff, 0x0) openat$fuse(0xffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) 13:42:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}, {&(0x7f00000000c0)='2', 0x1}], 0x2) [ 363.306504][ T35] audit: type=1326 audit(1607262172.782:13): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12345 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:42:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 13:42:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 13:42:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:53 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002180)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f00000021c0)='ns/net\x00') 13:42:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 13:42:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:53 executing program 2: r0 = openat$full(0xffffff9c, &(0x7f0000003340)='/dev/full\x00', 0x0, 0x0) mmap$perf(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) 13:42:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:53 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) timer_delete(0x0) 13:42:53 executing program 4: mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 13:42:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 13:42:53 executing program 2: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x80032, 0xffffffffffffffff, 0x0) 13:42:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 364.094014][ T35] audit: type=1326 audit(1607262173.572:14): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12345 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:42:53 executing program 4: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x80032, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4084071, 0xffffffffffffffff, 0x0) [ 364.240488][ T35] audit: type=1326 audit(1607262173.712:15): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12389 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:42:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:53 executing program 2: mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000004, 0x2071, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @private}}, {{0x2, 0x0, @empty}}}, 0x104) 13:42:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, 0x0, 0x0) 13:42:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280), 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:53 executing program 4: mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000004, 0x2071, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') 13:42:54 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) timer_delete(0x0) 13:42:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140), 0x0) 13:42:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af5be117"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:54 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[], 0x3c) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f00000000c0)=0x802, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:42:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280), 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:54 executing program 4: mmap$perf(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x2071, 0xffffffffffffffff, 0x0) 13:42:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) [ 365.173417][ T35] audit: type=1326 audit(1607262174.652:16): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:42:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}]}, 0x50}}, 0x0) 13:42:54 executing program 4: poll(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x4c}}, 0x0) 13:42:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140), 0x0) 13:42:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280), 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:55 executing program 3: timer_create(0x3, 0x0, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) timer_delete(0x0) 13:42:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140), 0x0) 13:42:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 13:42:55 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000052001f0014f9f407000904000200071004000100020000000800000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000006280)={&(0x7f0000003800), 0xc, &(0x7f0000006240)={&(0x7f0000003d00)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x4040055) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) sendfile(r3, r3, 0x0, 0xffffffff) 13:42:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b", 0xe) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 13:42:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:55 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000052001f0014f9f407000904000200071004000100020000000800000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000006280)={&(0x7f0000003800), 0xc, &(0x7f0000006240)={&(0x7f0000003d00)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x4040055) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) sendfile(r3, r3, 0x0, 0xffffffff) [ 366.146643][ T35] audit: type=1326 audit(1607262175.622:17): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12469 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:42:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b", 0xe) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:55 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x8000000000141048, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs4\x00', 0x0, &(0x7f0000000180)='v3\xd5\xa0w#\b\xc2\x01\xde\x9f\x03\x00\x00\x00m\xa1\xff\xaa\xf4\\\xf5|\xe8h\x87\x1cs\f\xb01\xa5p{\xe7\xee\xe2\x15\xd4\x9a6y\xfcQ&\xfbI\xaaG\'Hl\xa1(G\xcb;\xb3\xad+\xfd\x9ds]\xf3\x90') [ 366.466148][T12491] nfs4: Unknown parameter 'v3Õ w#ÂÞŸ' [ 366.488756][T12492] nfs4: Unknown parameter 'v3Õ w#ÂÞŸ' 13:42:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af5be11726970f935040a62f221649c485db90797577e25d3f7a9000000000000000000081"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 13:42:56 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000052001f0014f9f407000904000200071004000100020000000800000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000006280)={&(0x7f0000003800), 0xc, &(0x7f0000006240)={&(0x7f0000003d00)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x4040055) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) sendfile(r3, r3, 0x0, 0xffffffff) 13:42:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b", 0xe) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@mcast1, @in6=@empty, 0x2}}]}, 0x38}, 0x8}, 0x0) 13:42:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000052001f0014f9f407000904000200071004000100020000000800000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000006280)={&(0x7f0000003800), 0xc, &(0x7f0000006240)={&(0x7f0000003d00)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x4040055) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x145042, 0x0) sendfile(r3, r3, 0x0, 0xffffffff) 13:42:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f0000000000", 0x15) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 13:42:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x50, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 13:42:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af5be11726970f935040a62f221649c485db90797577e25d3f7a900000000000000000"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{}], 0x1) 13:42:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0xb, 0x0, &(0x7f0000000000)) 13:42:56 executing program 4: r0 = socket(0xa, 0x803, 0x101) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 13:42:56 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[], 0x3c) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f00000000c0)=0x802, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:42:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f0000000000", 0x15) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:57 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:42:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{}], 0x1) 13:42:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x110, 0x0, &(0x7f0000000280)="207ef39c5f3eb0bda7a300babe2bfe12b33cda3cc0ff5c560eae4300748a35596f29670211fc324e939f0501f1ebcb0dc47bb4a5cccff2dcb53929e496f9615197ab583e3ca52edccf0156229341f3acab08f270286e02033768346f05c255301e12c8cdd4e56242fe134a91270e233c107344d386bf13b1a7e123ed0e8ec37f9ab2786ec4ccc6e1ef5d79aa295ec82ef03e9e7925a327ab327f9c8048eddc5fe79604c9b8ce03944d15008d482a1b09312dd60956ec426ac8a5a7430790c5b17f575585925e4815af5be11726970f935040a62f221649c485db90797577e25d3f7a90000000000000000000816b095f011b7ff25e7e82d72abcf200000000000041e49ed44ff07507670f92d07af4f4"}, 0x48) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:57 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001040)) 13:42:57 executing program 4: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}) 13:42:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f0000000000", 0x15) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{}], 0x1) 13:42:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:57 executing program 5: semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x200}], 0x1, 0x0) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0304", 0x24}], 0x1) 13:42:57 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)) 13:42:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080), 0x4) 13:42:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000000", 0x19) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_TIMEOUT={0x8}]}]}, 0x58}}, 0x0) 13:42:57 executing program 5: mq_open(&(0x7f0000000000)='@!(\x00', 0x40, 0x0, &(0x7f00000000c0)={0x9, 0xaf33, 0x8, 0x101}) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0304", 0x24}], 0x1) 13:42:57 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20000801) 13:42:57 executing program 3: mmap$perf(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x131, 0xffffffffffffffff, 0x0) 13:42:57 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendfile(r1, r2, 0x0, 0xffffffff00d) 13:42:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a0304", 0x24}], 0x1) 13:42:57 executing program 5: io_setup(0x7, &(0x7f0000000000)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)={0x0, 0x989680}) 13:42:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000000", 0x19) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:58 executing program 3: pselect6(0x40, &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x1}, &(0x7f0000000180), 0x0, 0x0) 13:42:58 executing program 4: r0 = timerfd_create(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) [ 368.562086][ T35] audit: type=1804 audit(1607262178.042:18): pid=12604 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir873965336/syzkaller.8GHTO3/115/bus" dev="sda1" ino=16172 res=1 errno=0 [ 368.669969][ T35] audit: type=1804 audit(1607262178.122:19): pid=12604 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir873965336/syzkaller.8GHTO3/115/bus" dev="sda1" ino=16172 res=1 errno=0 13:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100400", 0x36}], 0x1) 13:42:58 executing program 3: r0 = eventfd2(0x0, 0x0) fcntl$setownex(r0, 0x402, &(0x7f0000000000)) 13:42:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x145042, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080ffffff7e) 13:42:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0xd, 0xa, 0x801}, 0x14}}, 0x0) 13:42:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f000000000000000000", 0x19) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') timerfd_settime(r0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 13:42:58 executing program 3: prctl$PR_GET_TSC(0x19, &(0x7f00000063c0)) 13:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100400", 0x36}], 0x1) [ 368.934724][ T35] audit: type=1800 audit(1607262178.412:20): pid=12624 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16172 res=0 errno=0 13:42:58 executing program 2: r0 = eventfd2(0x0, 0x0) fcntl$setownex(r0, 0x6, &(0x7f0000000000)={0x2}) [ 369.025310][ T35] audit: type=1804 audit(1607262178.472:21): pid=12624 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/137/bus" dev="sda1" ino=16172 res=1 errno=0 13:42:58 executing program 4: r0 = epoll_create(0x8) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) 13:42:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/27, 0x1b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:58 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002080)='/dev/vcsa\x00', 0x81, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 13:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf5100400", 0x36}], 0x1) 13:42:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) [ 369.757061][ T35] audit: type=1804 audit(1607262179.232:22): pid=12654 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/137/bus" dev="sda1" ino=16172 res=1 errno=0 [ 369.797347][ T35] audit: type=1804 audit(1607262179.262:23): pid=12654 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/137/bus" dev="sda1" ino=16172 res=1 errno=0 [ 369.834326][ T35] audit: type=1804 audit(1607262179.272:24): pid=12655 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/137/bus" dev="sda1" ino=16172 res=1 errno=0 [ 369.914850][ T35] audit: type=1804 audit(1607262179.372:25): pid=12657 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/137/bus" dev="sda1" ino=16172 res=1 errno=0 13:42:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x201}, 0x14}}, 0x0) 13:42:59 executing program 4: r0 = eventfd2(0x0, 0x0) fcntl$setownex(r0, 0x11, &(0x7f0000000000)) 13:42:59 executing program 3: perf_event_open$cgroup(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42988, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:42:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/27, 0x1b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000", 0x3f}], 0x1) 13:42:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') fcntl$setownex(r0, 0x6, &(0x7f0000000000)={0x2}) 13:42:59 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, 0x0) 13:42:59 executing program 3: kexec_load(0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0) 13:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000", 0x3f}], 0x1) 13:42:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') splice(r0, 0x0, r1, 0x0, 0x5, 0x0) 13:42:59 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 13:42:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/27, 0x1b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:42:59 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 13:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000", 0x3f}], 0x1) 13:42:59 executing program 3: msgrcv(0x0, 0x0, 0x0, 0x0, 0x4f01) 13:42:59 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:43:00 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan0\x00') 13:43:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700", 0x44}], 0x1) 13:43:00 executing program 4: semop(0x0, &(0x7f0000000100)=[{0x0, 0x9}, {}], 0x2) 13:43:00 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) 13:43:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 13:43:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, 0x17, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_FLAGS={0x8}]}, 0x1c}}, 0x0) 13:43:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700", 0x44}], 0x1) 13:43:00 executing program 4: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)={0x0}) getresgid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f00000042c0)) 13:43:00 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 13:43:00 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') write$cgroup_devices(r0, 0x0, 0x0) 13:43:00 executing program 3: socketpair(0xf, 0x3, 0x0, &(0x7f0000000300)) 13:43:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:00 executing program 4: semop(0x0, &(0x7f0000000100)=[{0x0, 0x9}, {0x0, 0x8, 0x1000}], 0x2) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700", 0x44}], 0x1) 13:43:00 executing program 2: memfd_create(&(0x7f0000000000)='\x00', 0x6) 13:43:00 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)={0x81, 0x41, "84214e9c5ebdffee6a2a6bfc3337565bd62d7b542f0a98af7327b6ea0c80ce62daad78cc916afd765891f04cb272e37a9461e0b818b506e92da77793294386f9d4"}) 13:43:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800004, &(0x7f00000001c0)=ANY=[]) 13:43:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:00 executing program 4: r0 = eventfd2(0x0, 0x0) fcntl$setownex(r0, 0x409, &(0x7f0000000000)) 13:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00000000000007000000", 0x46}], 0x1) 13:43:00 executing program 2: io_setup(0xffff, &(0x7f0000000200)) 13:43:01 executing program 5: r0 = eventfd2(0x0, 0x80000) fcntl$setownex(r0, 0x2, 0x0) 13:43:01 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f00000026c0)='/dev/vcs\x00', 0x10040, 0x0) 13:43:01 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x3) 13:43:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00000000000007000000", 0x46}], 0x1) 13:43:01 executing program 5: perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x90}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:43:01 executing program 3: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000001140)='\'') migrate_pages(0xffffffffffffffff, 0x3ff, &(0x7f0000000000), &(0x7f0000001100)) 13:43:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b00000000000007000000", 0x46}], 0x1) 13:43:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000640)={0x1c, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_ZONE={0x6}]}, 0x1c}}, 0x0) 13:43:01 executing program 5: mq_open(&(0x7f0000000100)='\"!L\x95\x86Br.\xb5\x90\x85\x9c\xdf\xb8R\xa5E\x1c\x91|\'^m|\xb8s\xd6O\x02\x95l\x88\x98\xc5?\xc0\x00\xf8\xe5\t\xcf)\xb5y$\x8c\xfe\xd3\x97b\x8fBg\xc2U\xc6\xdd\xdd1Mr\x9cT\b\xa1\xddP2H\xed\xc37\xf9\x14\x03\xffAS\x04\xe7\xd5\xffg\xf4\xc8[6*s\xa3@+\xe2\xef\xa6a\x1f\xc8c\xfbn\xc6\xd0\a\xccoI\t>\xae\xe4|H%\x9e\xc5\x8a\xf2\"\xf2', 0x40, 0x0, &(0x7f0000000180)={0xa, 0xffffffffffffff96, 0x8, 0x101}) 13:43:01 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) 13:43:01 executing program 4: pselect6(0x40, &(0x7f0000000080)={0x3}, 0x0, 0x0, 0x0, 0x0) 13:43:01 executing program 2: syz_emit_ethernet(0x26, &(0x7f0000000180)={@empty, @remote, @val, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "1ffc805de4397040"}}}}, 0x0) syz_emit_ethernet(0xe, &(0x7f00000001c0)={@multicast, @remote, @void, {@generic={0x88ca}}}, 0x0) 13:43:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080), 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700000000", 0x47}], 0x1) 13:43:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000440)=0xffffffffffffffff) 13:43:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080), 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') 13:43:01 executing program 3: r0 = mq_open(&(0x7f0000000000)='@!(\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0) 13:43:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000000)='./file0\x00', 0x0, 0xd804, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28500a8, &(0x7f00000000c0)) 13:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700000000", 0x47}], 0x1) 13:43:02 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000003c0)={{0x2, 0x0, 0xffffffffffffffff}}) 13:43:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080), 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b0000000000000700000000", 0x47}], 0x1) 13:43:02 executing program 3: sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/207) 13:43:02 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='environ\x00') read$char_raw(r0, &(0x7f0000000200)={""/20076}, 0x5000) 13:43:02 executing program 5: socketpair(0x1, 0x0, 0x68ee9cd7, &(0x7f0000000240)) 13:43:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:02 executing program 3: clock_gettime(0x3, &(0x7f0000000100)) 13:43:02 executing program 0: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) fchown(r0, 0x0, 0xffffffffffffffff) 13:43:02 executing program 4: ustat(0x20, &(0x7f0000000300)) [ 373.253202][T12806] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 373.277256][T12806] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 13:43:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000000)='./file0\x00', 0x0, 0xd804, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28500a8, &(0x7f00000000c0)) 13:43:02 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/btrfs-control\x00', 0x200000, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 13:43:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@fat=@allow_utime={'allow_utime'}}, {@fat=@nfs='nfs'}]}) 13:43:02 executing program 4: unshare(0x40000400) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, 0x0, 0x0) 13:43:02 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @auto=[0x0, 0x33]}, &(0x7f0000000100)={0x0, "0354c89177073ee7229828f119cfe04680e4caef26f1c3bac77f0a61a9f721b17e53e9c5ee507b420a6fe9089cba3a0a2cc769be7e9a7103a75efa7f0169cf83"}, 0x48, 0xfffffffffffffffc) 13:43:03 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/129) [ 373.472243][T12844] IPVS: ftp: loaded support on port[0] = 21 [ 373.476035][T12843] FAT-fs (loop3): bogus number of reserved sectors 13:43:03 executing program 0: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) poll(&(0x7f00000013c0)=[{r0}], 0x1, 0x3c) 13:43:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 373.550670][T12843] FAT-fs (loop3): Can't find a valid FAT filesystem [ 373.640354][T12844] IPVS: ftp: loaded support on port[0] = 21 [ 373.648126][T12849] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 13:43:03 executing program 3: semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, &(0x7f00000000c0)) 13:43:03 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') fsync(r0) 13:43:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000000)='./file0\x00', 0x0, 0xd804, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28500a8, &(0x7f00000000c0)) 13:43:03 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt_cache\x00') 13:43:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x0, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:03 executing program 3: timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x0) 13:43:03 executing program 5: prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/26) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) 13:43:03 executing program 4: sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0) 13:43:03 executing program 0: semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, &(0x7f00000000c0)) [ 374.105617][T12907] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 13:43:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x0, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f0000000000)='./file0\x00', 0x0, 0xd804, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28500a8, &(0x7f00000000c0)) 13:43:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, 0x17, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x28}}, 0x0) 13:43:03 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000200)="e1", 0xfea8, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r1, 0x0, r0, 0x0, 0x40009, 0x0) 13:43:03 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 13:43:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "4c24f596fe16d29dee01dac3d0b68f84"}, 0x11, 0x0) 13:43:03 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) 13:43:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x0, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 374.477836][T12925] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 13:43:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000000b1c0)='fdinfo\x00') perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:43:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x1f, 0x4) 13:43:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x5, 0x1, 0x201}, 0x14}}, 0x0) 13:43:04 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000200)={0x14, 0x453, 0x0, 0x0, 0x0, "ea"}, 0x14}}, 0x0) 13:43:04 executing program 0: clock_adjtime(0x3, 0x0) 13:43:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 374.817295][ T35] audit: type=1107 audit(1607262184.292:26): pid=12941 uid=0 auid=0 ses=4 subj==unconfined msg='ê' 13:43:04 executing program 4: socket$alg(0x26, 0x5, 0x0) open(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x149042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="02", 0x1}], 0x1, 0x0, 0x0) 13:43:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000100)=""/226, &(0x7f0000000200)=0xe2) 13:43:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x1, 0x2, 0x5}, 0x14}}, 0x0) 13:43:04 executing program 5: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'a'}}, 0x119) 13:43:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x201}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001880)=[{{&(0x7f0000000000)=@ax25={{0x3, @default}, [@default, @rose, @bcast, @netrom, @bcast, @remote, @rose, @bcast]}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/64, 0x40}], 0x1, &(0x7f00000001c0)=""/60, 0x3c}}], 0x1, 0x20, &(0x7f0000001940)) 13:43:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x2, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xf, 0x6, 'sane-20000\x00'}, @CTA_EXPECT_TUPLE={0x4}, @CTA_EXPECT_ZONE={0x6}]}, 0x30}}, 0x0) 13:43:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 375.121611][ T8293] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 13:43:04 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='auxv\x00') [ 375.172494][ T8293] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 13:43:04 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8380, 0x0) 13:43:04 executing program 4: request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0) [ 375.255600][ T8911] hid-generic 0000:0000:0000.0002: item fetching failed at offset 0/1 [ 375.304187][ T8911] hid-generic: probe of 0000:0000:0000.0002 failed with error -22 13:43:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) flock(r0, 0x0) 13:43:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@device={'device', 0x3d, './file0'}}], [{@smackfsroot={'smackfsroot', 0x3d, '{(,[##\x17!'}}]}) 13:43:04 executing program 5: add_key$user(&(0x7f0000001240)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 13:43:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:05 executing program 4: r0 = eventfd2(0x0, 0x0) fcntl$setownex(r0, 0x40e, &(0x7f0000000000)={0x7}) 13:43:05 executing program 3: socketpair(0x10, 0x0, 0x0, &(0x7f0000000080)) 13:43:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x7fffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000000c0)={0x80000}) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) recvmmsg(0xffffffffffffffff, &(0x7f000000c380)=[{{&(0x7f0000000080)=@tipc=@name, 0x80, &(0x7f0000000740)=[{&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000e00)=""/178, 0xb2}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f0000000540)=""/158, 0x9e}, {&(0x7f0000000600)=""/97, 0x61}, {&(0x7f0000000680)=""/135, 0x87}], 0xa, &(0x7f0000000800)=""/126, 0x7e}, 0x80}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/132, 0x84}], 0x1, &(0x7f0000000c40)=""/105, 0x69}, 0x58ac}, {{&(0x7f0000000a00)=@generic, 0x80, &(0x7f00000010c0)=[{&(0x7f000000b280)=""/209, 0xd1}, {&(0x7f0000000b80)=""/32, 0x20}, {&(0x7f000000b180)=""/195, 0xc3}, {&(0x7f0000000cc0)=""/164, 0xa4}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/7, 0x7}, {&(0x7f0000001580)=""/177, 0xb1}, {&(0x7f0000000ec0)=""/231, 0xe7}, {&(0x7f0000000fc0)=""/149, 0x95}, {&(0x7f0000001080)=""/13, 0xd}], 0xa}, 0x5}, {{&(0x7f000000c600)=@l2, 0x80, &(0x7f0000001240)=[{&(0x7f0000002000)=""/4084, 0xff4}, {&(0x7f0000001200)}], 0x2, &(0x7f0000001280)=""/31, 0x1f}, 0x10000}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001340)=""/213, 0xd5}, {&(0x7f0000001440)=""/221, 0xdd}], 0x2, &(0x7f000000b380)=""/206, 0xce}, 0x835}, {{&(0x7f0000001680)=@isdn, 0x80, &(0x7f0000001840)=[{&(0x7f0000001700)=""/60, 0x3c}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/173, 0xad}], 0x4, &(0x7f0000004000)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001880)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001900)=""/66, 0x42}, {&(0x7f0000001980)=""/223, 0xdf}, {&(0x7f0000001a80)=""/80, 0x50}, {&(0x7f0000001b00)=""/120, 0x78}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/135, 0x87}], 0x7, &(0x7f0000007000)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001d00)=@pppol2tp, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/3, 0x3}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/232, 0xe8}], 0x3, &(0x7f0000001f00)=""/150, 0x96}, 0x3ff}, {{&(0x7f0000009000)=@isdn, 0x80, &(0x7f000000c200)=[{&(0x7f0000009080)=""/4096, 0x1000}, {&(0x7f000000a080)}, {&(0x7f000000a0c0)=""/178, 0xb2}, {&(0x7f000000a180)=""/4096, 0x1000}, {&(0x7f000000c680)=""/4105, 0x1009}, {&(0x7f000000c180)=""/83, 0x53}], 0x6, &(0x7f000000c280)=""/199, 0xc7}, 0xffff}], 0x9, 0xc3, &(0x7f000000c5c0)={0x0, 0x989680}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) r3 = getgid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0x0, 0x0) setregid(r3, r5) fchown(0xffffffffffffffff, r2, r5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000, 0x3, &(0x7f0000000300)=[{&(0x7f00000001c0)="bd0260bafb2aa2394413b08c1b501e4f6e25fccb16c611a0b7feec26e40bba1af4a7eaaab925c445e9f94fdd490d5f8062b99206a0fe6dc6d83d249341107f0559624ac1d67b8a6b88695a2af5db74ff1e62b5b19e1ed8eeb3204012c8faf801be988e4f545ce4eba4f8d7ec504585fa86f76593323b9592125df3ad9bafb1f74e333e00f236042f29c1f505e5e305b69aad3b927c87a59fc306452b", 0x9c, 0x200}, {&(0x7f0000000280)="c537ac83a6af93a06e552f6c11292099cd4d6034a4b753edd1a0e10eea4b6786657e74ba43f0d36e470042c866e615aa4aaff756dd0f4840328054f9382b29c2a35b9b810dc435551baf6e07a663d172303ef22eb2e445d071b26bc6f5837966dd66b8c2d05ecf6271dcbf8f2328656c24db86e077b1de", 0x77, 0x25}, {&(0x7f0000000080)="f6ef591e", 0x4}], 0x40001, &(0x7f0000000400)={[{'][-!-!/'}, {'])*]^\'^,]*'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor'}}, {@uid_lt={'uid<', r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r6}}, {@subj_user={'subj_user'}}]}) shmctl$SHM_UNLOCK(0x0, 0xc) 13:43:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:05 executing program 0: io_setup(0x7, &(0x7f0000000180)=0x0) io_getevents(r0, 0xffffffffffff0005, 0x0, 0x0, 0x0) 13:43:05 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x1, 0x0) 13:43:05 executing program 3: socketpair(0xf, 0x0, 0x0, &(0x7f0000000080)) [ 375.826312][ T35] audit: type=1800 audit(1607262185.302:27): pid=12995 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 errno=0 13:43:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000244b8e9b57f04b59aa229cc218853f95010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000dbf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) [ 376.186552][T13005] loop0: detected capacity change from 0 to 1048576 [ 376.248712][T13005] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 376.268610][T13005] ext4 filesystem being mounted at /root/syzkaller-testdir636657698/syzkaller.tuK5St/180/file0 supports timestamps until 2038 (0x7fffffff) 13:43:07 executing program 2: semop(0x0, &(0x7f0000000100)=[{0x0, 0x9}], 0x1) 13:43:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:07 executing program 4: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040), 0x0) 13:43:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x7fffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000000c0)={0x80000}) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) recvmmsg(0xffffffffffffffff, &(0x7f000000c380)=[{{&(0x7f0000000080)=@tipc=@name, 0x80, &(0x7f0000000740)=[{&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000e00)=""/178, 0xb2}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f0000000540)=""/158, 0x9e}, {&(0x7f0000000600)=""/97, 0x61}, {&(0x7f0000000680)=""/135, 0x87}], 0xa, &(0x7f0000000800)=""/126, 0x7e}, 0x80}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/132, 0x84}], 0x1, &(0x7f0000000c40)=""/105, 0x69}, 0x58ac}, {{&(0x7f0000000a00)=@generic, 0x80, &(0x7f00000010c0)=[{&(0x7f000000b280)=""/209, 0xd1}, {&(0x7f0000000b80)=""/32, 0x20}, {&(0x7f000000b180)=""/195, 0xc3}, {&(0x7f0000000cc0)=""/164, 0xa4}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/7, 0x7}, {&(0x7f0000001580)=""/177, 0xb1}, {&(0x7f0000000ec0)=""/231, 0xe7}, {&(0x7f0000000fc0)=""/149, 0x95}, {&(0x7f0000001080)=""/13, 0xd}], 0xa}, 0x5}, {{&(0x7f000000c600)=@l2, 0x80, &(0x7f0000001240)=[{&(0x7f0000002000)=""/4084, 0xff4}, {&(0x7f0000001200)}], 0x2, &(0x7f0000001280)=""/31, 0x1f}, 0x10000}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001340)=""/213, 0xd5}, {&(0x7f0000001440)=""/221, 0xdd}], 0x2, &(0x7f000000b380)=""/206, 0xce}, 0x835}, {{&(0x7f0000001680)=@isdn, 0x80, &(0x7f0000001840)=[{&(0x7f0000001700)=""/60, 0x3c}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/173, 0xad}], 0x4, &(0x7f0000004000)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001880)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001900)=""/66, 0x42}, {&(0x7f0000001980)=""/223, 0xdf}, {&(0x7f0000001a80)=""/80, 0x50}, {&(0x7f0000001b00)=""/120, 0x78}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/135, 0x87}], 0x7, &(0x7f0000007000)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001d00)=@pppol2tp, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/3, 0x3}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/232, 0xe8}], 0x3, &(0x7f0000001f00)=""/150, 0x96}, 0x3ff}, {{&(0x7f0000009000)=@isdn, 0x80, &(0x7f000000c200)=[{&(0x7f0000009080)=""/4096, 0x1000}, {&(0x7f000000a080)}, {&(0x7f000000a0c0)=""/178, 0xb2}, {&(0x7f000000a180)=""/4096, 0x1000}, {&(0x7f000000c680)=""/4105, 0x1009}, {&(0x7f000000c180)=""/83, 0x53}], 0x6, &(0x7f000000c280)=""/199, 0xc7}, 0xffff}], 0x9, 0xc3, &(0x7f000000c5c0)={0x0, 0x989680}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) r3 = getgid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0x0, 0x0) setregid(r3, r5) fchown(0xffffffffffffffff, r2, r5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000, 0x3, &(0x7f0000000300)=[{&(0x7f00000001c0)="bd0260bafb2aa2394413b08c1b501e4f6e25fccb16c611a0b7feec26e40bba1af4a7eaaab925c445e9f94fdd490d5f8062b99206a0fe6dc6d83d249341107f0559624ac1d67b8a6b88695a2af5db74ff1e62b5b19e1ed8eeb3204012c8faf801be988e4f545ce4eba4f8d7ec504585fa86f76593323b9592125df3ad9bafb1f74e333e00f236042f29c1f505e5e305b69aad3b927c87a59fc306452b", 0x9c, 0x200}, {&(0x7f0000000280)="c537ac83a6af93a06e552f6c11292099cd4d6034a4b753edd1a0e10eea4b6786657e74ba43f0d36e470042c866e615aa4aaff756dd0f4840328054f9382b29c2a35b9b810dc435551baf6e07a663d172303ef22eb2e445d071b26bc6f5837966dd66b8c2d05ecf6271dcbf8f2328656c24db86e077b1de", 0x77, 0x25}, {&(0x7f0000000080)="f6ef591e", 0x4}], 0x40001, &(0x7f0000000400)={[{'][-!-!/'}, {'])*]^\'^,]*'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor'}}, {@uid_lt={'uid<', r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r6}}, {@subj_user={'subj_user'}}]}) shmctl$SHM_UNLOCK(0x0, 0xc) 13:43:07 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000140)={0x81, 0x4a, "84214e9c5ebdffee6a2a6bfc3337565bd62d7b542f0a98af7327b6ea0c80ce62daad78cc916afd765891f04cb272e37a9461e0b818b506e92da77793294386f9d42a5fc51281952d0644"}) 13:43:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom(r0, 0x0, 0x0, 0x40000041, 0x0, 0x0) [ 377.962590][ T35] audit: type=1800 audit(1607262187.422:28): pid=13031 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=2 res=0 errno=0 13:43:07 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000180), &(0x7f0000001700)=0x4) 13:43:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in, 0x1000}, 0x90) 13:43:07 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) dup2(r1, r0) 13:43:07 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 13:43:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x7fffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000000c0)={0x80000}) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) recvmmsg(0xffffffffffffffff, &(0x7f000000c380)=[{{&(0x7f0000000080)=@tipc=@name, 0x80, &(0x7f0000000740)=[{&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000e00)=""/178, 0xb2}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f0000000540)=""/158, 0x9e}, {&(0x7f0000000600)=""/97, 0x61}, {&(0x7f0000000680)=""/135, 0x87}], 0xa, &(0x7f0000000800)=""/126, 0x7e}, 0x80}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/132, 0x84}], 0x1, &(0x7f0000000c40)=""/105, 0x69}, 0x58ac}, {{&(0x7f0000000a00)=@generic, 0x80, &(0x7f00000010c0)=[{&(0x7f000000b280)=""/209, 0xd1}, {&(0x7f0000000b80)=""/32, 0x20}, {&(0x7f000000b180)=""/195, 0xc3}, {&(0x7f0000000cc0)=""/164, 0xa4}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/7, 0x7}, {&(0x7f0000001580)=""/177, 0xb1}, {&(0x7f0000000ec0)=""/231, 0xe7}, {&(0x7f0000000fc0)=""/149, 0x95}, {&(0x7f0000001080)=""/13, 0xd}], 0xa}, 0x5}, {{&(0x7f000000c600)=@l2, 0x80, &(0x7f0000001240)=[{&(0x7f0000002000)=""/4084, 0xff4}, {&(0x7f0000001200)}], 0x2, &(0x7f0000001280)=""/31, 0x1f}, 0x10000}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001340)=""/213, 0xd5}, {&(0x7f0000001440)=""/221, 0xdd}], 0x2, &(0x7f000000b380)=""/206, 0xce}, 0x835}, {{&(0x7f0000001680)=@isdn, 0x80, &(0x7f0000001840)=[{&(0x7f0000001700)=""/60, 0x3c}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/173, 0xad}], 0x4, &(0x7f0000004000)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001880)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001900)=""/66, 0x42}, {&(0x7f0000001980)=""/223, 0xdf}, {&(0x7f0000001a80)=""/80, 0x50}, {&(0x7f0000001b00)=""/120, 0x78}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/135, 0x87}], 0x7, &(0x7f0000007000)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001d00)=@pppol2tp, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/3, 0x3}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/232, 0xe8}], 0x3, &(0x7f0000001f00)=""/150, 0x96}, 0x3ff}, {{&(0x7f0000009000)=@isdn, 0x80, &(0x7f000000c200)=[{&(0x7f0000009080)=""/4096, 0x1000}, {&(0x7f000000a080)}, {&(0x7f000000a0c0)=""/178, 0xb2}, {&(0x7f000000a180)=""/4096, 0x1000}, {&(0x7f000000c680)=""/4105, 0x1009}, {&(0x7f000000c180)=""/83, 0x53}], 0x6, &(0x7f000000c280)=""/199, 0xc7}, 0xffff}], 0x9, 0xc3, &(0x7f000000c5c0)={0x0, 0x989680}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) r3 = getgid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0x0, 0x0) setregid(r3, r5) fchown(0xffffffffffffffff, r2, r5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000, 0x3, &(0x7f0000000300)=[{&(0x7f00000001c0)="bd0260bafb2aa2394413b08c1b501e4f6e25fccb16c611a0b7feec26e40bba1af4a7eaaab925c445e9f94fdd490d5f8062b99206a0fe6dc6d83d249341107f0559624ac1d67b8a6b88695a2af5db74ff1e62b5b19e1ed8eeb3204012c8faf801be988e4f545ce4eba4f8d7ec504585fa86f76593323b9592125df3ad9bafb1f74e333e00f236042f29c1f505e5e305b69aad3b927c87a59fc306452b", 0x9c, 0x200}, {&(0x7f0000000280)="c537ac83a6af93a06e552f6c11292099cd4d6034a4b753edd1a0e10eea4b6786657e74ba43f0d36e470042c866e615aa4aaff756dd0f4840328054f9382b29c2a35b9b810dc435551baf6e07a663d172303ef22eb2e445d071b26bc6f5837966dd66b8c2d05ecf6271dcbf8f2328656c24db86e077b1de", 0x77, 0x25}, {&(0x7f0000000080)="f6ef591e", 0x4}], 0x40001, &(0x7f0000000400)={[{'][-!-!/'}, {'])*]^\'^,]*'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor'}}, {@uid_lt={'uid<', r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r6}}, {@subj_user={'subj_user'}}]}) shmctl$SHM_UNLOCK(0x0, 0xc) 13:43:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000080), &(0x7f0000000000)=0x8) 13:43:07 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 378.428893][ T35] audit: type=1800 audit(1607262187.902:29): pid=13063 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=3 res=0 errno=0 13:43:08 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f0000000080)={0x6, 0x0, 0x100}, 0x8) 13:43:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/145, 0x91}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/144, 0x90}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000340)=""/21, 0x15}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) r4 = dup(r3) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000007c0)=""/238, 0xee}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x8}, 0x0) shutdown(r4, 0x0) 13:43:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x7fffffff, 0x1) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000000c0)={0x80000}) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) recvmmsg(0xffffffffffffffff, &(0x7f000000c380)=[{{&(0x7f0000000080)=@tipc=@name, 0x80, &(0x7f0000000740)=[{&(0x7f0000000000)=""/33, 0x21}, {&(0x7f0000000180)=""/132, 0x84}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000e00)=""/178, 0xb2}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000004c0)=""/98, 0x62}, {&(0x7f0000000540)=""/158, 0x9e}, {&(0x7f0000000600)=""/97, 0x61}, {&(0x7f0000000680)=""/135, 0x87}], 0xa, &(0x7f0000000800)=""/126, 0x7e}, 0x80}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/132, 0x84}], 0x1, &(0x7f0000000c40)=""/105, 0x69}, 0x58ac}, {{&(0x7f0000000a00)=@generic, 0x80, &(0x7f00000010c0)=[{&(0x7f000000b280)=""/209, 0xd1}, {&(0x7f0000000b80)=""/32, 0x20}, {&(0x7f000000b180)=""/195, 0xc3}, {&(0x7f0000000cc0)=""/164, 0xa4}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)=""/7, 0x7}, {&(0x7f0000001580)=""/177, 0xb1}, {&(0x7f0000000ec0)=""/231, 0xe7}, {&(0x7f0000000fc0)=""/149, 0x95}, {&(0x7f0000001080)=""/13, 0xd}], 0xa}, 0x5}, {{&(0x7f000000c600)=@l2, 0x80, &(0x7f0000001240)=[{&(0x7f0000002000)=""/4084, 0xff4}, {&(0x7f0000001200)}], 0x2, &(0x7f0000001280)=""/31, 0x1f}, 0x10000}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001340)=""/213, 0xd5}, {&(0x7f0000001440)=""/221, 0xdd}], 0x2, &(0x7f000000b380)=""/206, 0xce}, 0x835}, {{&(0x7f0000001680)=@isdn, 0x80, &(0x7f0000001840)=[{&(0x7f0000001700)=""/60, 0x3c}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/173, 0xad}], 0x4, &(0x7f0000004000)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000001880)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001900)=""/66, 0x42}, {&(0x7f0000001980)=""/223, 0xdf}, {&(0x7f0000001a80)=""/80, 0x50}, {&(0x7f0000001b00)=""/120, 0x78}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/135, 0x87}], 0x7, &(0x7f0000007000)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000001d00)=@pppol2tp, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/3, 0x3}, {&(0x7f0000008000)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/232, 0xe8}], 0x3, &(0x7f0000001f00)=""/150, 0x96}, 0x3ff}, {{&(0x7f0000009000)=@isdn, 0x80, &(0x7f000000c200)=[{&(0x7f0000009080)=""/4096, 0x1000}, {&(0x7f000000a080)}, {&(0x7f000000a0c0)=""/178, 0xb2}, {&(0x7f000000a180)=""/4096, 0x1000}, {&(0x7f000000c680)=""/4105, 0x1009}, {&(0x7f000000c180)=""/83, 0x53}], 0x6, &(0x7f000000c280)=""/199, 0xc7}, 0xffff}], 0x9, 0xc3, &(0x7f000000c5c0)={0x0, 0x989680}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) r3 = getgid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0x0, 0x0) setregid(r3, r5) fchown(0xffffffffffffffff, r2, r5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000, 0x3, &(0x7f0000000300)=[{&(0x7f00000001c0)="bd0260bafb2aa2394413b08c1b501e4f6e25fccb16c611a0b7feec26e40bba1af4a7eaaab925c445e9f94fdd490d5f8062b99206a0fe6dc6d83d249341107f0559624ac1d67b8a6b88695a2af5db74ff1e62b5b19e1ed8eeb3204012c8faf801be988e4f545ce4eba4f8d7ec504585fa86f76593323b9592125df3ad9bafb1f74e333e00f236042f29c1f505e5e305b69aad3b927c87a59fc306452b", 0x9c, 0x200}, {&(0x7f0000000280)="c537ac83a6af93a06e552f6c11292099cd4d6034a4b753edd1a0e10eea4b6786657e74ba43f0d36e470042c866e615aa4aaff756dd0f4840328054f9382b29c2a35b9b810dc435551baf6e07a663d172303ef22eb2e445d071b26bc6f5837966dd66b8c2d05ecf6271dcbf8f2328656c24db86e077b1de", 0x77, 0x25}, {&(0x7f0000000080)="f6ef591e", 0x4}], 0x40001, &(0x7f0000000400)={[{'][-!-!/'}, {'])*]^\'^,]*'}], [{@seclabel='seclabel'}, {@smackfsfloor={'smackfsfloor'}}, {@uid_lt={'uid<', r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r6}}, {@subj_user={'subj_user'}}]}) shmctl$SHM_UNLOCK(0x0, 0xc) 13:43:08 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x5}, 0x8) 13:43:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:08 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) [ 378.844561][ T35] audit: type=1800 audit(1607262188.312:30): pid=13091 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 errno=0 13:43:08 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 13:43:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) 13:43:08 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000100)=""/255, 0xf6, 0x0, 0x0, 0x36) 13:43:08 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x90) 13:43:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x24048814) 13:43:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:09 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4040000) 13:43:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff3e80e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, 0x0) 13:43:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 13:43:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x40000) 13:43:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 13:43:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:09 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, 0x0, 0x0) 13:43:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:09 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r0, 0x0, 0x3fff80000) 13:43:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r0, 0x0, 0x0) 13:43:09 executing program 0: sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, 0x0, 0x0) 13:43:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0), 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x2}, 0x40) 13:43:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 13:43:10 executing program 0: bpf$MAP_CREATE(0xd, &(0x7f0000000940), 0x40) 13:43:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @dev}, 0x10) 13:43:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0xf8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d8, 0xffffffff, 0xffffffff, 0x1d8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@inet=@socket2={{0x28, 'socket\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 13:43:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0), 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) [ 380.789353][T13176] x_tables: duplicate underflow at hook 3 13:43:10 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 13:43:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000307) 13:43:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:10 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.origin\x00') 13:43:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0), 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x28) 13:43:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:10 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x22840, 0x0) 13:43:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') r2 = dup3(r0, r1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, 0x0, 0xfffffdf0) 13:43:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xe}, 0x40) 13:43:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0xe75e, 0x5}, 0x40) 13:43:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000440)={'syztnl2\x00', 0x0}) 13:43:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xd, 0x2, 0x4, 0x5}, 0x40) 13:43:10 executing program 3: syz_mount_image$nfs4(&(0x7f0000001ec0)='nfs4\x00', 0x0, 0x25, 0x0, &(0x7f0000002300), 0x0, &(0x7f0000002380)={[], [{@fsmagic={'fsmagic'}}]}) socketpair$unix(0x1, 0x0, 0x0, 0x0) 13:43:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 13:43:11 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:11 executing program 0: syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x26, &(0x7f0000000540)=ANY=[]) 13:43:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xac, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x94, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x7a, 0x4, "4d8ffbd5f5ecf1217466abc8fc245926f4e75cf4bfcdb7741aa89abc265fbb91c214ddaef54ad4ae91f947aa4eca941a8233d4bd4c4e6c3b4f65f202e5a758fa9025196dda7a4ee50900f672c57a2d0c3f1407fc0b04aa34dd7818710781f79a422f9339b70723c53cc9b901fd438cd30b6185c55f44"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x4a}}, 0x0) 13:43:11 executing program 2: perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:43:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:11 executing program 3: getpid() gettid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0xc01, 0x3, 0x308, 0x170, 0x5002004a, 0x0, 0x170, 0x0, 0x270, 0x3c8, 0x3c8, 0x270, 0x3c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x60, 0x128, 0x170, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv6=@private2, [], @ipv4=@multicast2, [], @ipv4=@multicast2, [], @ipv6=@private1}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'batadv0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) 13:43:11 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:11 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x2e, &(0x7f0000000100), 0x4) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) utimes(0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x840c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) write$9p(r0, &(0x7f0000001400)="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", 0x600) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000180), 0x4) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000003c0)={0x18, 0xfffffffffffffffe}, 0x18) sendfile(r0, r1, 0x0, 0x10000) 13:43:11 executing program 2: rename(&(0x7f0000006940)='./file0\x00', 0x0) [ 382.027059][T13247] xt_CT: No such helper "pptp" 13:43:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000400)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 13:43:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:11 executing program 3: getpid() gettid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0xc01, 0x3, 0x308, 0x170, 0x5002004a, 0x0, 0x170, 0x0, 0x270, 0x3c8, 0x3c8, 0x270, 0x3c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x60, 0x128, 0x170, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv6=@private2, [], @ipv4=@multicast2, [], @ipv4=@multicast2, [], @ipv6=@private1}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'batadv0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) 13:43:11 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:11 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001040)='/dev/loop-control\x00', 0x20000, 0x0) 13:43:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x13, 0x0, &(0x7f0000000300)) 13:43:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:11 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) [ 382.453578][T13264] xt_CT: No such helper "pptp" 13:43:12 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x0, @fixed, 0x4e80}, 0xe) 13:43:12 executing program 3: getpid() gettid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0xc01, 0x3, 0x308, 0x170, 0x5002004a, 0x0, 0x170, 0x0, 0x270, 0x3c8, 0x3c8, 0x270, 0x3c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x60, 0x128, 0x170, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv6=@private2, [], @ipv4=@multicast2, [], @ipv4=@multicast2, [], @ipv6=@private1}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'batadv0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) 13:43:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x22, &(0x7f0000000000)="c1e74426", 0x4) 13:43:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000780)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) 13:43:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:12 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:12 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0210800913"], 0x98}}, 0x0) [ 382.791880][T13283] xt_CT: No such helper "pptp" 13:43:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:12 executing program 3: getpid() gettid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0xc01, 0x3, 0x308, 0x170, 0x5002004a, 0x0, 0x170, 0x0, 0x270, 0x3c8, 0x3c8, 0x270, 0x3c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x60, 0x128, 0x170, 0x0, {}, [@common=@unspec=@conntrack1={{0xb8, 'conntrack\x00'}, {{@ipv6=@private2, [], @ipv4=@multicast2, [], @ipv4=@multicast2, [], @ipv6=@private1}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'batadv0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) 13:43:12 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpgid(0x0) keyctl$unlink(0x9, 0x0, 0x0) unshare(0x40600) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 13:43:12 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 383.118322][T13300] xt_CT: No such helper "pptp" 13:43:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 13:43:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000040)=""/101) 13:43:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0x0) 13:43:13 executing program 3: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000001400000000000000010000000100e8ff342fc8f9bf8c3ab5c90fe00101000000000000acea88766e4aa5c393b583010bb7c5cec90937aa8ff6f2b6afc6a746a1bf593532f88e75dccf0005cff30655f7193b400b99c60759d55c49f305f5a90a63ddaf249041d9568821e30512904d24922fcbc64749e49494ae97f289a781681a38032f3937ea575f4d8f04277464fcdd102c2ca185bc1076935b1b", @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x38}, 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000200)={0xf41, 0x0, 0x91}) 13:43:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:13 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpgid(0x0) keyctl$unlink(0x9, 0x0, 0x0) unshare(0x40600) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 13:43:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0x0) 13:43:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x800000}, 0xc) 13:43:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {0x0}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:13 executing program 0: perf_event_open(&(0x7f0000004580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:43:13 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpgid(0x0) keyctl$unlink(0x9, 0x0, 0x0) unshare(0x40600) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 13:43:13 executing program 3: r0 = getpid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x3, 0xffffffffffffffff, 0x0) 13:43:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0x0) 13:43:13 executing program 2: socketpair(0x2, 0x80b, 0x0, &(0x7f0000000000)) 13:43:13 executing program 0: getresuid(&(0x7f0000006d80), &(0x7f0000006dc0), 0x0) 13:43:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {0x0}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:13 executing program 3: semctl$GETPID(0x0, 0xc802f6858482f3b6, 0xb, 0x0) 13:43:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 384.232237][ T35] audit: type=1800 audit(1607262193.712:31): pid=13341 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16330 res=0 errno=0 13:43:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {0x0}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:13 executing program 0: syz_emit_ethernet(0xe1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000091"], 0x0) 13:43:13 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 13:43:13 executing program 3: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) 13:43:14 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpgid(0x0) keyctl$unlink(0x9, 0x0, 0x0) unshare(0x40600) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 13:43:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:43:14 executing program 0: clone3(&(0x7f0000000300)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0, 0x0], 0x2}, 0x58) 13:43:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:14 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x1]}, 0x8}) 13:43:14 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 384.750577][ T9815] Bluetooth: hci5: command 0x0405 tx timeout 13:43:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 13:43:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req={0x0, 0x0, 0x0, 0x4}, 0x10) 13:43:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x6a6, 0x1, "11"}, 0x9) close(r0) 13:43:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:43:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) 13:43:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0xa}, 0xa) chown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 13:43:14 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a01e1"], 0xa) mkdir(&(0x7f0000001140)='./file0\x00', 0x0) 13:43:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:43:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x8000, 0x0) open$dir(&(0x7f00000000c0)='./file0/file0\x00', 0xc8cc581ce1d00764, 0x0) 13:43:14 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000080)=0x672e, 0x4) 13:43:14 executing program 5: socket(0x0, 0x0, 0x6) 13:43:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:15 executing program 3: mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) 13:43:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:43:15 executing program 2: munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) 13:43:15 executing program 5: setrlimit(0x0, &(0x7f0000000280)={0x0, 0xfffffffffffffde5}) 13:43:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setregid(0xffffffffffffffff, r1) 13:43:15 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000000), 0xc) 13:43:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:15 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) read(r0, &(0x7f0000000540)=""/46, 0x2e) 13:43:15 executing program 5: mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0x3010, 0xffffffffffffffff, 0x0) 13:43:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:15 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCMSET(r0, 0x8004746d, &(0x7f0000000000)) 13:43:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x380, 0x0) 13:43:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:15 executing program 2: poll(&(0x7f0000000180)=[{}], 0x1, 0x0) 13:43:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs={0x0, 0x0, 0x3}, 0x8) 13:43:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {0x0}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x18, 0x4, &(0x7f0000001340)=@framed={{}, [@jmp]}, &(0x7f0000001380)='syzkaller\x00', 0x5, 0xc8, &(0x7f00000013c0)=""/200, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:15 executing program 3: socketpair(0x2, 0x3, 0x0, &(0x7f0000000300)) 13:43:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x34}}, 0x0) 13:43:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x4, &(0x7f0000001340)=@framed={{}, [@generic={0x20}]}, &(0x7f00000013c0)='syzkaller\x00', 0x5, 0x90, &(0x7f0000001400)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000103c0)) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) 13:43:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}]}, 0x2c}}, 0x0) 13:43:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000380)={0x3, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2400b, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x8c0, 0x0, 0x0, 0x400, 0x2}, r0, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100008, 0x500001c) 13:43:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3102}}, &(0x7f0000000100)='GPL\x00', 0x2, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) 13:43:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}]}, 0x2c}}, 0x0) 13:43:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 13:43:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) 13:43:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x1ff) [ 386.866075][ T35] audit: type=1804 audit(1607262196.332:32): pid=13481 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/182/memory.events" dev="sda1" ino=16323 res=1 errno=0 13:43:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 386.975582][ T35] audit: type=1804 audit(1607262196.422:33): pid=13491 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir065899456/syzkaller.URTzAK/182/memory.events" dev="sda1" ino=16323 res=1 errno=0 13:43:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}]}, 0x2c}}, 0x0) 13:43:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) 13:43:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 13:43:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 13:43:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 13:43:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {0x0}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8}]}, 0x30}}, 0x0) 13:43:16 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8201, 0x0) 13:43:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(r0, 0x301, 0x0) 13:43:16 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40142, 0x0) 13:43:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x6081, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 13:43:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8}]}, 0x30}}, 0x0) 13:43:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {0x0}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:16 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000d40)={@map, 0xffffffffffffffff, 0x21}, 0x14) 13:43:17 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 13:43:17 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$sock_linger(r0, 0x1, 0x14, &(0x7f0000000000), 0x8) 13:43:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@empty}, 0x14) 13:43:17 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, &(0x7f0000000200)="356138a797bfc3bd411e2b17162e94210a0efb0d8d2577ad6cd59b7c9a688074554b079612d28173676dad9a68b185cb45b0ed431917161da9934de653ecbaf58992872f8ba020875d94e0ee9b8aef9fdaae0e3b5d2178c223c0ca30e872472592c0d521522b2e997e74a1d286be31deb05d316c9f7c0fe3862301a8a3c4319756b698ef34440bc4377cdab579febd3d36475a3cc326210213330c9405772edd1c0416356192f8770473854b5ead2b198b88830065"}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8}]}, 0x30}}, 0x0) 13:43:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {0x0}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="58010000", @ANYRES16=r1, @ANYBLOB="010026bd7000fddbdf250100000040000380"], 0x158}}, 0x0) 13:43:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:43:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="70010000", @ANYRES16=r1, @ANYBLOB="010000000000000000000a0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030000000000080001007063690011000200a7ff4e28303030303a30303a31"], 0x170}}, 0x0) 13:43:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c000000c8a3d3"], 0x4c}}, 0x0) 13:43:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x28}}, 0x0) 13:43:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="58010000", @ANYRES16=r1, @ANYBLOB="010026bd7000fddbdf250100000040000180140003"], 0x158}}, 0x0) 13:43:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:43:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, &(0x7f00000003c0)=@framed={{}, [@func]}, &(0x7f0000000440)='GPL\x00', 0x1, 0xca, &(0x7f0000000480)=""/202, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:17 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 13:43:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x28}}, 0x0) 13:43:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 388.145434][T13560] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 388.184678][T13562] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 13:43:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:43:17 executing program 2: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) read$alg(r0, 0x0, 0x0) 13:43:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc) 13:43:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x28}}, 0x0) 13:43:17 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0xc020660b, 0x0) 13:43:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:43:18 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000006, 0x400e811, r0, 0x0) 13:43:18 executing program 5: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, r1, 0x0}]) 13:43:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x2c}}, 0x0) 13:43:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x6b4}, 0x1, 0x0, 0x6800}, 0x0) 13:43:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000080)=0x1, 0x4) 13:43:18 executing program 2: r0 = socket(0xa, 0x3, 0x2) bind(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) 13:43:18 executing program 0: r0 = socket(0xa, 0x3, 0x2) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x80, 0x0}}], 0x1, 0x0) 13:43:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x2c}}, 0x0) 13:43:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1a, 0x0, &(0x7f0000000080)) 13:43:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)="c2", 0x1, 0x400c4, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) 13:43:18 executing program 2: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:43:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[{0x10, 0x0, 0x0, "10"}, {0xc}], 0x1c}, 0x0) 13:43:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/194, 0xc2}], 0x1, 0x0, 0x47385086) 13:43:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x4}, @IPSET_ATTR_LINENO={0x8}]}, 0x2c}}, 0x0) 13:43:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:18 executing program 3: io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000100)=[0x0]) 13:43:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="18010000", @ANYRES16, @ANYBLOB="01"], 0x11c}}, 0x0) 13:43:18 executing program 5: openat$zero(0xffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) io_setup(0x2179, &(0x7f0000000000)) 13:43:18 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 13:43:18 executing program 2: r0 = openat$uinput(0xffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 13:43:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:43:18 executing program 3: r0 = openat$ppp(0xffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) 13:43:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:19 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x0) io_setup(0x1b, &(0x7f0000000000)) 13:43:19 executing program 0: io_setup(0x2, &(0x7f0000000000)) r0 = eventfd(0x6) read$eventfd(r0, &(0x7f0000000040), 0x8) 13:43:19 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000001480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 13:43:19 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], r1}, 0x40) 13:43:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rpcgss_svc_accept\x00', r0}, 0x10) 13:43:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:19 executing program 3: sendmsg$inet(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000500), 0x0}, 0x20) 13:43:19 executing program 0: bpf$OBJ_GET_MAP(0x1e, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00'}, 0x10) 13:43:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x209e20, 0x2, 0x1}, 0x40) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f0000000140)}, 0x20) 13:43:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x1, 0x4, 0x6, 0x5}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000011c0)={&(0x7f0000000000)="f6", 0x0, 0x0, 0x0, 0x7, r0}, 0x38) 13:43:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x15, 0x8, 0x4, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 13:43:19 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) 13:43:19 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000003f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r1, r2, 0x25, 0x4}, 0x10) 13:43:19 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x100, 0x209e28, 0x1, 0x1}, 0x40) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000000280)=""/203}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r0, &(0x7f00000002c0), &(0x7f0000000040)=""/45}, 0x20) 13:43:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000003f00)=ANY=[@ANYBLOB="18020000e2ffffff000000000000000085000000360000009500001800000000922ae83713ab9600010000801b10fb54a8cb72d232ad558c46fff4208d49631979a42d6884ec11ce1413ac30e00bd0081f8504e19a5183d769676520e98a263345e44d5187b3c4d86abeb12303ff139fe0d0020000d604000000670000008aff66d6b3181ffc1d62a3954c11c27839dc007c4d286e7359ea79a75dd098bbc4fa13aee48ca9e8969faebf3183fe803ab3f5024b52dc265b36fc9dae00a0d0956d252bd8b6464ef3c6a7def8bad3ca6e3abdb2dfc61696e340bb8e2a093adc57196b40def3858ef569147fa4108328392d322ab4df10a2f69a6bdf7257d327070e42410f57466f59aea2544047d6d8ac442e0000000000ee16c729300d230180000000000000a8a0b36754ed5290a8cd8470e776d6b80630d6cbde49b29a6cb5f4fc0001745c380e6a0bbe6ebf7e1f5fe57238aeada5acf3209a08439f1ff01ffbe5b57922b6f6c67e02aa6d7760525b595fe1f697bc114cd1778e97a3f0295f946974cdb458be2a34cf924dc36b558fbf17a76f3547497aba5086e30ec8a57c814382ffab045ca077a9d15251875432e74b54afaf4985672a1c7b3c200021de95ae7b68136b0046d535dd39c0f35469869e9b342b953f81447e6b9e522d62b1e6ffcaab304f134306335fc7a44195254b45a6c1312a13696c7202df5f764713504f94c5e0fbc70bcb975f97ed7b0300000000000000e54e9072a22d91744a332e2fa806e63c5cd98a8569a6d6bcfb0000002cf6c75ac63f04af77c98a1459ab1664885173b2b7130eae67e0ebe380d0f648713e68153579c02d71c58d147b00821ab9a6475b31e1ebf1369afe98682efbf3983f283f2faf8f40e39927aca9ec527fb5b6bf7e7b0374814d63c93c912dd0c6908149cb79c54b0a38856929e7d8b1b06c9bd5d7e5490f3b8596b694ea9483bd4bd287c83df998a7469426ec8b0000000000000010ff2cd18bdd8ad0983bc90770bbd26a82b9d99d17c02a97b52304ff3e49b47bfa22782ca00edf8e47a71bcc738ef636d32b01933556f9afe772cd45af0a400bd3c06cb78aeffe2753088e02ca6bb2feecf0a93a03371320980865c7c62ea4d8f8a864dce9fa85aeb0454349100296ee2dba39c3f6fd6cf96714e168e03b506380591a8c68e537dd659a7418c1e122bd4c219ff5a679eec4600e99f017246dc0c18a30160f2ac54f842e3be1c95b15175d0e664beb126000e96549e1a1208c686edb475b705e8a9515c96f4fc6b3c925ea40e61026dc6c6618580fd6ce9eac602c1756f6d105671241d48a8abe64f5caecc4ef953383722135ed9925989e01eae489ec7052f82a72cb26c7a8aa63999ee1f47ce5cb734d773ea52b6dbbd56d222659480e82c6f84d2033d9d1b597c57bf1f4da8d4d8d4ce1822d14b7c7699b9d701e94e7b421dd474cffbc35bc8623cd5eb68af82275a940be6f5288eacb42822cbcc3fbe7d90de96d6a8e9f54cf881f606b381e4803b500000000000000000000004a2357ba5f6000de1cfa88b7165dcfcf2aaee86d48f25b5024b653ea923c19e6cb723c1923b3eea2d73e136dff383c9fbbac53dfdcb1a68c98d8e96fe39eec23963faf3ebed31aec56987fde93e9ced678a621450a9b01f9f2772e5fa454d68d90677d8de36c3215d2ff3cfadcf65eb92adc6c62d66b11cb2d7556414a86dfa94bb7aa52c7febb1e9b2efcbbc5bccf9d39bed802f4f056976a128c764ec454b90200fd9603f96908bddc1450b4084abc4c7b82e05595a68c34e79253e3bb34bc7d049bea9bf149fef4df5c45f8b94c5aafad755c43e63664e4b26a0000000000000000008da351c32c7fc927a9419ec895629e2d15826c1e633da4e6ca552681afef70d76a8b131c098e8f164fb3b4b6b68214be6b780fcb1e0f42d0b0f51fcccffffabb5824613daf8e62d6403974d68065067622284b29f0a469fc43c8cdb7d35ce2b290fb5db3e1b2a0ee25ab91b467440f41a0927ff959783abbcbd21d620bf8e43b0e78845b5950370c58c06f6e12971cdc3403fb9cfde15d8cf6879504e36af770d14105265a4e657282e30bded9afe89509330c4684a89cba5d323f0010098ef3650d5c02c639a4662d82b0664e201d22eaef998409bf29d1da5d8917c45915c198e393e6838fe9fd53ba5cf6378c6656991cd21dcc1c9d9c9fd0e783d809134913e6c66a3ce8ab4187c7ed20d12b4502989f696bd28dc0460c07772f4c87dce58e95b427558a79444f4ef41a4d1a21a6c74ed2bd4ff6741c01eb1415dc7a0ad2db8b1d861ae93a46de9addcc3719e373a650c727f553ebdf6c1919a540db5620cbf79f7f2a3aadd9527e3841c8b3cd5efb5b84a4c9e92c2e1df6201be54992b625d283ce80f564b427e6bd3584cea6a1b0ec0db7ed0499ac77cea07ff129b369e86f3ca16df96d5856d53c34292df5d84b1ff6d7d4963d4053ce30ee703542046d41f6e91a74c736e47eab7d22396accc8af354767323161d2c1c372eb4a3c9d582ed45699f7e124029a33e41106019f13fdf0bb47511c0b650330f1ec158a81e4ece042655c640b08a82263f37a46a869d7f587c7f1fcda4563f1575e349845dfc48a90b85f97552b85df863a036b7ca493242d51157eb049622f7149353e39b055d57006045123f78e27336041f33c4b3cc4b030db78f57f6d5c0abdd129f7c523a13418dcfd5be171b2a069c9dfc9c9e0d073f6c325eced2b76c9a44d6e5298278271402f5bdce24cc4fa52a38d386526131addf5ae573c68250bb58d65e4598941b2f3521dbc37d1f5f2f603588660a4ebd22b694121a35982cff4f31d2c506dae9cf722f1281cc168f08f2412da119f3b43a432d796d86e9edbe66104bb995824748acd73fe2ab99042f9295a12b820abe3c3c35ab56b2a0c86cb017b2cbe9a07125cb18f44f91037f6c7b2d555776a6d0962a403d76d7343e183c7d8c283d6fb6f92eb09a3da3adb7dc8e6fa5ce4aa107ef95be583abc71a5fc8921f92fdd55e958c2646c7ee55e47d9c952df78cb9f930ff70d6689acd211eb6e4a1e14dc2ff2da2e81eeb39afe7d0ffe613903d269b24608a54db45e469c386b489805c36aa31248e23e21efe472a59d635ecbb93a5d7cb0619bcf4ac458ec81de99a1af68fbc1fdef4263bb52c826b63cba152aed6927f457b158c674ba8093c6c1e1a544a9b80d1dabbdecd9430b86150831475a48cd06819c222ba7c38cec90836c894e24ef9772b2a651f0e1ec73adb669f0c0a58dc54561f66afc10148eac9c196fe7d88d2e8ff1dd7a36eee99a313537cd88f290e"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25, 0x2}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000014c0)={r2}, 0x10) 13:43:19 executing program 3: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x2]) 13:43:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x2d, 0x0, &(0x7f0000004800)) 13:43:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:43:19 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x41a101) 13:43:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "2cbd088ee6e1fa3bae8423c3b95bc245d46ace8dbe9f09f04f4e6deeb3b2370c6cc6700cc7c6800105abbdb76ac1642a083f0231fced83aa0e099cfea94befbc", "e9bf2eb3f6777a257900aa525e5603ed3b4e632d526e8f9bbd8cd038ef70a7a0"}) 13:43:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xffffff7d, 0x21c0) 13:43:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x0, 0x2}, 0x40) 13:43:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x2}, 0x40) 13:43:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3ffdcf, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x2]}, 0x40) 13:43:20 executing program 0: r0 = memfd_create(&(0x7f0000000200)='\x15\xf7^\xf9\x12\x0f\xbd+\xa7\xce\xfa%\x98\xc6\x1e\x1e\xf8\x0213\xce\x89x\xb6\x9b\xfbp\x9f\xd5\x9d\b\xb7\x1b\xcc\x91\xc9\x12\xb01\xa8\x1e\xdb\xea+\xfd\x8d\xe7\xdc\x90\x90\xa8\x1a\xa6%\xc2\x85d?\x15W\xc0\xb9\xfb\x01&\xbb\xce6\xe7\x96\xf2\xf5\n!\xc5\xe2\xef\xce\xff\xec\xac9\x98\xb4<\xc5|\x0e\xae', 0x200) ftruncate(r0, 0x8007999) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 13:43:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x29, 0x0, &(0x7f0000004800)) 13:43:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:20 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x64}, {0x6}]}) 13:43:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 13:43:20 executing program 4: clock_gettime(0xae37291f96b93895, 0x0) [ 391.031385][ T35] audit: type=1326 audit(1607262200.512:34): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13726 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:43:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x29, 0x0, &(0x7f0000004800)) 13:43:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000040)={0x0, 0x80}) 13:43:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @empty, {[@generic={0x0, 0x2}, @timestamp_addr={0x44, 0x4}]}}}}}) 13:43:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x29, 0x0, &(0x7f0000004800)) 13:43:20 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'macsec0\x00'}}, 0x1e) 13:43:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:43:21 executing program 3: semget(0x2, 0x3ca6bb34f2540915, 0x0) 13:43:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 391.813807][ T35] audit: type=1326 audit(1607262201.292:35): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=13726 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:43:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f00000001c0)=@raw=[@map_val], &(0x7f0000000200)='GPL\x00', 0x0, 0x2000, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:43:21 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000140)={{0x1, 0x0, 0x0, 0x3}}) 13:43:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x29, 0x0, &(0x7f0000004800)) 13:43:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f000000ac40)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000002280)="ef", 0x1}, {0x0}, {&(0x7f0000002380)="8b", 0x1}], 0x3}}], 0x1, 0x0) 13:43:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x5}}], 0x18}}], 0x1, 0x0) 13:43:21 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:43:21 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000080)={0x0, 0x0, "52c687", 0x94}) 13:43:21 executing program 5: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000009c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:43:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:21 executing program 3: syz_open_dev$evdev(&(0x7f0000000a80)='/dev/input/event#\x00', 0x0, 0x0) 13:43:21 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000009c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000a00)='disconnect aa:aa:aa:aa:aa:11 2', 0x1e) 13:43:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:21 executing program 5: perf_event_open(&(0x7f0000002480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:43:21 executing program 3: socket$inet(0x2, 0x80002, 0x80) 13:43:21 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000b80)={[0x7ff]}, &(0x7f0000000bc0), 0x8) 13:43:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:22 executing program 5: syz_open_dev$evdev(&(0x7f0000000a80)='/dev/input/event#\x00', 0x0, 0x200001) 13:43:22 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 13:43:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000b80), &(0x7f0000000bc0), 0x8) 13:43:22 executing program 3: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x80000002) 13:43:22 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000440)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2c37a457"}, 0x0, 0x0, @userptr}) 13:43:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:22 executing program 4: pipe2$9p(&(0x7f00000002c0), 0x0) 13:43:22 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65]}}]}) 13:43:22 executing program 4: syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 13:43:22 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f0000000980)='devlink\x00') 13:43:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @dev}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000040)={'syztnl1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB=')']}) 13:43:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:22 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001280)='/proc/thread-self\x00', 0x42, 0x0) [ 393.348124][T13834] tmpfs: Bad value for 'nr_inodes' [ 393.373610][T13834] tmpfs: Bad value for 'nr_inodes' 13:43:22 executing program 2: syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x410000) 13:43:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:22 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0}, 0x38) 13:43:23 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000ec0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 13:43:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000080)={0x0, 0x0, "52c687"}) 13:43:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:23 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000500), &(0x7f0000000540)=0x4) 13:43:23 executing program 4: bpf$PROG_BIND_MAP(0x23, &(0x7f0000001a80), 0xc) 13:43:23 executing program 3: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 13:43:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 13:43:23 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0)='l2tp\x00') 13:43:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:23 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) setxattr$trusted_overlay_redirect(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 13:43:23 executing program 5: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x4082, 0x0) 13:43:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:23 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001280)='/proc/thread-self\x00', 0x42, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0)='l2tp\x00') r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001300)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 13:43:23 executing program 4: process_vm_readv(0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/167, 0xa7}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000180)=""/138, 0x94}, {&(0x7f00000002c0)=""/157, 0xad}, {&(0x7f0000000380)=""/253, 0xfd}], 0x1ffffffffffffef4, &(0x7f0000000940)=[{&(0x7f0000000980)=""/4104, 0x1000}], 0x1, 0x0) 13:43:23 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000000600), 0x0) syz_mount_image$tmpfs(&(0x7f0000000800)='tmpfs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x4, &(0x7f0000001a40)=[{&(0x7f0000000880)="e0de7614c2", 0x5, 0x6}, {&(0x7f0000000900), 0x0, 0x3}, {&(0x7f0000000940)="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", 0xd44, 0x6a}, {&(0x7f0000001940)="4a160cfc041a2883e8bae2df951970a696334a147492cac7a199893f8edc1dabe6ef2b6daf8d6a606c4cd2fbe8ce90e048b5183b479c7e7f0d68e6a596eb8db71ecf257abbaf90e266aaccffa6b29e21bda73800afdf4b601cbf8c915af855fb1e23d01f297b5a1ba59c6d64805686f930fd38e266f30256d5ce8dffd12a9cdedef9670be04390b99684460277cc89485f94de34584c42d08eba77384d857da3be8d4a05c59fd0afebcb0bd98cc484e0fbb34908df96dc7f0fd266529073df9d22aee9fd4d79f4b5bd5175648f6ed8", 0xcf}], 0x8, &(0x7f0000001ac0)={[{@huge_within_size='huge=within_size'}, {@huge_always='huge=always'}, {@huge_advise='huge=advise'}]}) 13:43:23 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x11401, &(0x7f0000000340)) [ 394.190703][ T8911] Bluetooth: hci0: command 0x0401 tx timeout 13:43:23 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000440)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2c37a457"}, 0x0, 0x0, @userptr}) [ 394.250241][T13888] loop3: detected capacity change from 0 to 3072 13:43:23 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001a40)=[{&(0x7f0000000880)="e0", 0x1}, {&(0x7f00000008c0)="b2", 0x1, 0xfffffffffffffffc}], 0x0, 0x0) 13:43:23 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$evdev(r0, 0x0, 0x0) 13:43:23 executing program 5: syz_open_dev$video(&(0x7f00000009c0)='/dev/video#\x00', 0x0, 0x80000) 13:43:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:23 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x65]}}]}) [ 394.489564][T13899] loop4: detected capacity change from 0 to 8388096 13:43:24 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001280)='/proc/thread-self\x00', 0x42, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0)='l2tp\x00') r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001300)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000001340)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x660, 0x5, 0x5, 0x10000, 0x0, 0x1f, "c45c8dcdb540aba621ad8178ca151df122fb36943bff1a14b1b9c1ea28755a6a78689bf7ede2cddbe27d79a817370d0f21120afd8a3c9646ca690fe0bc9eeb563f828b26bf3d7d471975680f513279dfb77ff9e6e24bd4f265737936b472aac3f7250e9de745316053b9cae5399908da060bc040d293b38b5c986ffe1d73f4d6ee66d2d50614860487a80f2f66037199a534091c9730dec0e4c515244289fdc5457cd585bc3998c5aed4e8354fed9728ecefe4964ff96f57e7b7fe5a6b54346c73fe3e721c0d9b4af69b7cd4d028b0c4b8f2df4446d018c9caee95101decd084c1366f223c7fea0eaa14c2525fb9bd607ea352c1f2f49280fc433621c633744c3202360cd8388d2d1d04d9269ef11f0ea6495a1b4360e7dec79f72e30ebe41185d46c2cb8dc714aa959970e4d1a8c0c342357af0b3e4005f977b35537ce35fbc3d9fb1bd45ad62af03494cb2247ce2b7bb33b8105c7e737157bdf58cf768f76eb204c35f2701d830804f6e1fe7be042c18b078debd94620911af7a382dfa00c58d2b4258fcb8547b801bbfcd36e8441aac4075d0379d1be3d35ec12e78cf75528f9aa4812554e8f797edfdf3835bb2ae0860b007eb42ad58170c00709dcd996595a20af229123b976bf0d648f68eaea1ea2df40f0aee9bffaa7b8be97461b970a57a5d65c45714c1a252b1c8df6032b5d37a21aac1de8e85aca7b3b2aa5b5eb7513b9c5fc05edcf51a262670d4e504c13944977b484eabaed99db03d95bd4b3cb1463f3d288b5d145438283f25a3bec6dad5ab01d911c1c19c8eeadb63d3e65e653843ad721a567668b2bf563bef27c4296dc3932a51de432907e8dc49692ba61448006d500824941ed835c0a1155a196ae899ff5e41158ae94139969441297c94b4a865c18a7044878a58926f3b0922d89729cd9493ff1fe490fb7b6c213e839c3766340eb4e434583c6e1361f2af2dd2898187ccfa474e6b1124b2652e1faad417fd974c1ca20011e2f1390aa5a89f7055e2dd86dd9d982fdbeef3bbea659c07bd03fb2491f323a8b9aaf1ede6fb5fa5af97f595a218f986b776f452dc267731a9ffdde45aa43c5994dc039f42834aa735d2eb5830b5c3ad198192c4095277bf77b7b388e399a249567181664581032f918a850e40552803ea49452cf62780fc4af8e780c3206bd65ee0499420346501b7f935a1059b53b99ed3868aaf3c59c75f799bcbb87efc48032e87ce6978d1ef6e6443cd37e6eb3491bc447ee32eb7602cb326c672ecab2359260a3f54056cb20fa45b4ac1e908bfbcded476cff847c189556e7af6430268314320f74ed9fab75447c2b281263bf24ec8657b5861613196e8a888a42ac79dda300c71695a375b4cf5ba2caf26b4b08c1a1f330b6b35cbb3aedf96da581eb3efa924db000411dc7c8d3b983f74c68169e723c163388af94a30bd497d9ab0e684abfa4f048a2ed8e2b0ea2091b2bc4859047ad139a719ecb228fcfd94c821b48362772073aa3da5b487c1a123e3431dd43fe6e31fb6267d8cf64fdd2201f77bb4b228a65eabfbfa1ef4b9c60f49cc138a118ba5f3d885a19d17ba937efbb679df0fa76c8e70759e5edbc1ea77665899f941c34419a62a182fac8cce2b4c3b245dd0e2e73daa098d0b2d8d38873488390e3589de26b26ba4f5bc1776a03752ba7f1319c49d9321b4851c7fc0593a6c0a500e8c8a23f5ed42b7c198cbd7164514270e6a7ad572cb4acb9547ea9e2f1409d771c44e9ae6efeb03b2b7449cf3ad3f081e8a5a3d2d43ccf480437295fa3dafaf6a15461a84a04843b19bef7d74cc02ef7c491670900a137ad1fcb790cc06c10b3711286eaf5f46d579fd06c392c39e3a930e1f79d8186ecf8faed99b2df8fca2761e61860fb2fba8b0ab5394468bfcc8c62dcdde7e5cd515818bf2f61c88aff2a90505ccd5dda4f9fcd8136a4ba260f08db1cd293e7fbb738970ea4942a8d0fb71d4b1bf0630ed551164a58319afae0b7aa709c51cd5bba2b5bacc23544f256da2fcd80fbda75385f3ae5158f30ae71958c9aa128cb4229e2b5e1d12f3f0f18e069ec900f65b812d21e8373f55837038d7dcf602f5e55ba7fb8fcfb1c34ad7d06c8c4ea88dd2f7fef25bbad649526e30e2b119530699ff905ffc782ea4b36a1edd94595284efcd2162fb3ab598626ff2cf62641f143bf59006641d16b9661aca54f8a177d1c2a0fb235aa0e15869e1f217a87b82a60aab3c90a6ac2c774250b859c6198aaea3cb1cae268932bae0e7a6c7521e6697ec2f89e349ebc75ac8f4e4eb8790056878"}}, 0x778) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 13:43:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x348, 0xffffffff, 0x338, 0x430, 0x100, 0xffffffff, 0xffffffff, 0x430, 0x430, 0x430, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_vlan\x00', 'sit0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ipv6={@private0, @ipv4={[], [], @empty}, [], [], 'veth1_macvtap\x00', 'ipvlan0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a8) 13:43:24 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x400001, 0x0) 13:43:24 executing program 3: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) syz_open_dev$char_raw(0x0, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) [ 394.622838][T13899] loop4: detected capacity change from 0 to 8388096 13:43:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:24 executing program 4: syz_genetlink_get_family_id$batadv(0x0) syz_io_uring_setup(0x39a5, &(0x7f00000005c0), &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000000640), &(0x7f0000000680)) 13:43:24 executing program 2: dup(0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100080dbf4655fdcf4655fdcf4655f000000000000040008000000000000000500000008", 0x29, 0x4200}], 0x0, &(0x7f0000013a00)=ANY=[]) getdents(r0, 0x0, 0x0) 13:43:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:24 executing program 0: msgsnd(0x0, &(0x7f0000000dc0), 0x8, 0x0) 13:43:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 13:43:24 executing program 3: getitimer(0x2, &(0x7f0000000580)) 13:43:24 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "7f"}}, 0x119) write$UHID_DESTROY(r0, &(0x7f00000025c0), 0x4) 13:43:24 executing program 5: syz_genetlink_get_family_id$l2tp(0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 395.061080][T13937] loop2: detected capacity change from 0 to 262144 13:43:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) [ 395.188658][T13937] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:24 executing program 3: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x143000) 13:43:24 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00', 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, "7fc9ed"}}, 0x11b) 13:43:24 executing program 5: openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0)='l2tp\x00') openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) 13:43:24 executing program 3: syz_open_dev$char_raw(&(0x7f0000000380)='/dev/raw/raw#\x00', 0x0, 0x500) 13:43:24 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000540)) 13:43:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 13:43:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:25 executing program 4: syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x202) 13:43:25 executing program 3: ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, 0x0) 13:43:25 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 395.591293][ T9815] hid-generic 0000:0000:0000.0003: item fetching failed at offset 0/3 [ 395.610003][ T9815] hid-generic: probe of 0000:0000:0000.0003 failed with error -22 13:43:25 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000001140)=ANY=[@ANYBLOB="12010000000000401c1b341b40000000000109022400010000000009040000010301000009210000000122010009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001440)={0x24, 0x0, 0x0, &(0x7f0000000400)={0x0, 0x22, 0x2, {[@local=@item_012={0x1, 0x2, 0x0, '\x00'}]}}, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:43:25 executing program 0: perf_event_open(&(0x7f0000002480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) 13:43:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:25 executing program 4: getitimer(0x0, &(0x7f0000000580)) 13:43:25 executing program 3: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000700)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) 13:43:25 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001280)='/proc/thread-self\x00', 0x42, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000012c0)='l2tp\x00') openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000002480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 13:43:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:25 executing program 3: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000300)={0xb}, 0xb) 13:43:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) recvmsg$can_j1939(r0, 0x0, 0x0) 13:43:25 executing program 5: getresgid(&(0x7f00000005c0), 0x0, 0x0) [ 396.140611][ T8911] usb 3-1: new high-speed USB device number 2 using dummy_hcd 13:43:25 executing program 3: syslog(0x2, &(0x7f00000000c0)=""/54, 0x36) [ 396.270561][ T9815] Bluetooth: hci0: command 0x0401 tx timeout [ 396.531993][ T8911] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 396.557536][ T8911] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 396.585169][ T8911] usb 3-1: New USB device found, idVendor=1b1c, idProduct=1b34, bcdDevice= 0.40 [ 396.595292][ T8911] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 396.615137][ T8911] usb 3-1: config 0 descriptor?? [ 397.105034][ T8911] corsair 0003:1B1C:1B34.0004: item fetching failed at offset 0/1 [ 397.127015][ T8911] corsair 0003:1B1C:1B34.0004: parse failed [ 397.140862][ T8911] corsair: probe of 0003:1B1C:1B34.0004 failed with error -22 [ 397.309365][ T8911] usb 3-1: USB disconnect, device number 2 [ 398.120709][ T5] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 398.490674][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 398.506511][ T5] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 398.518343][ T5] usb 3-1: New USB device found, idVendor=1b1c, idProduct=1b34, bcdDevice= 0.40 [ 398.528337][ T5] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 398.538461][ T5] usb 3-1: config 0 descriptor?? 13:43:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002200)={0xb, 0x0, 0x0, 0x7ac2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x40) 13:43:28 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f00000018c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 13:43:28 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000001180), 0x6) 13:43:28 executing program 4: perf_event_open(&(0x7f0000002480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) [ 398.900594][ T5] usbhid 3-1:0.0: can't add hid device: -71 [ 398.906815][ T5] usbhid: probe of 3-1:0.0 failed with error -71 13:43:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000500)={'syztnl2\x00', &(0x7f0000000480)={'syztnl2\x00', 0x0, 0x29, 0xff, 0x1, 0x7fff, 0x1, @local, @mcast2, 0x8000, 0x7, 0x1ff, 0x3}}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000580)={0x7, &(0x7f0000000540)=[{0x5, 0x5, 0x7e, 0x1}, {0x0, 0x4, 0x0, 0x5}, {0x6, 0xe1, 0xf8, 0x5}, {0xcd1, 0x4, 0xff, 0x5}, {0x9, 0x3, 0x19, 0xfffff001}, {0x7, 0x5, 0x20, 0x4}, {0x8e, 0xf, 0x2, 0x5}]}) [ 398.992081][ T5] usb 3-1: USB disconnect, device number 3 13:43:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:28 executing program 3: bind$ax25(0xffffffffffffffff, 0x0, 0x0) 13:43:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:28 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x0]}}]}) 13:43:28 executing program 5: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) [ 399.209425][ T35] audit: type=1326 audit(1607262208.682:36): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=14067 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:43:28 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBSENT(r0, 0x4b71, &(0x7f0000000040)={0x0, "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"}) 13:43:28 executing program 4: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000005c0)) 13:43:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:28 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001a40)=[{&(0x7f0000000880)="e0", 0x1}, {&(0x7f00000008c0)="b2", 0x1, 0xfffffffffffffffc}, {&(0x7f0000000900)='r', 0x1}], 0x0, 0x0) 13:43:29 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000000600), 0x0) syz_mount_image$tmpfs(&(0x7f0000000800)='tmpfs\x00', &(0x7f0000000840)='./file0\x00', 0x1, 0x4, &(0x7f0000001a40)=[{&(0x7f00000008c0)="b22b5c23312bfc58e97d87f51ac49a", 0xf, 0xfffffffffffffffc}, {&(0x7f0000000900)="729482d6812e00d4fb36f34a7da64d268def3e4a900fb6974df29c4f29ce813f976e05719c37326c", 0x28, 0x3}, {&(0x7f0000000940)="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", 0xff4, 0x6a}, {&(0x7f0000001940)="4a160cfc041a2883e8bae2df951970a696334a147492cac7a199893f8edc1dabe6ef2b6daf8d6a606c4cd2fbe8ce90e048b5183b479c7e7f0d68e6a596eb8db71ecf257abbaf90e266aaccffa6b29e21bda73800afdf4b601cbf8c915af855fb1e23d01f297b5a1ba59c6d64805686f930fd38e266f30256", 0x78}], 0x8, &(0x7f0000001ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x6d]}}]}) [ 399.556690][T14098] loop3: detected capacity change from 0 to 8388096 [ 399.621990][T14100] loop5: detected capacity change from 0 to 8388096 [ 399.727307][T14100] loop5: detected capacity change from 0 to 8388096 [ 399.949408][ T35] audit: type=1326 audit(1607262209.422:37): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=14067 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:43:29 executing program 2: mq_unlink(&(0x7f0000000680)=')#L[&-]\x00') 13:43:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:29 executing program 4: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, 0x0, 0x0) 13:43:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 13:43:29 executing program 3: syz_open_dev$evdev(&(0x7f0000000a80)='/dev/input/event#\x00', 0xfffffffffffffff7, 0x200001) 13:43:29 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000b80), 0x0, 0x8) 13:43:29 executing program 3: syz_mount_image$exfat(&(0x7f0000000340)='exfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x204a060, &(0x7f00000002c0)=ANY=[]) 13:43:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 13:43:29 executing program 4: fanotify_mark(0xffffffffffffffff, 0x19, 0x0, 0xffffffffffffffff, 0x0) 13:43:29 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x6c801, 0x0) 13:43:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000680)={'gre0\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @dev}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000040)={'syztnl1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB=').']}) 13:43:29 executing program 2: openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000002080)='/dev/raw/rawctl\x00', 0x4000, 0x0) 13:43:29 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 13:43:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 13:43:30 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0xcb) 13:43:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:30 executing program 3: socket(0x18, 0x0, 0xfffffff9) 13:43:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xbd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 401.037288][T14171] loop2: detected capacity change from 0 to 262144 [ 401.076398][T14171] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 401.090239][T14171] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:30 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 13:43:30 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000400)="1c2bf1b23cbb703f46db0428c1c5f7c40efd0fc22ced09", 0x17, 0xfffffffffffffffe) 13:43:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) [ 401.225344][T14185] loop3: detected capacity change from 0 to 524288 [ 401.264189][T14185] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 401.281415][T14185] EXT4-fs (loop3): orphan cleanup on readonly fs [ 401.296152][T14185] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 13:43:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) [ 401.334820][T14185] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue [ 401.344462][T14193] encrypted_key: master key parameter '' is invalid [ 401.356301][T14193] encrypted_key: master key parameter '' is invalid 13:43:30 executing program 5: socket(0x28, 0x0, 0xfffffff3) [ 401.530363][T14171] loop2: detected capacity change from 0 to 262144 [ 401.545301][T14171] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 401.555533][T14171] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 13:43:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:31 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 13:43:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) socket(0x0, 0x0, 0x0) 13:43:31 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000900)='/dev/vcs#\x00', 0x4, 0x0) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, 0x0) 13:43:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 401.971836][T14218] loop3: detected capacity change from 0 to 524288 13:43:31 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@hyper}) [ 402.033605][T14218] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 402.043319][T14223] loop2: detected capacity change from 0 to 262144 13:43:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 402.137654][T14218] EXT4-fs (loop3): orphan cleanup on readonly fs [ 402.150723][T14223] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 402.161167][T14223] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:31 executing program 4: socket(0x0, 0x0, 0xfffffff9) 13:43:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 402.180585][T14218] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 402.200367][T14218] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:31 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, 0x0, 0x1aef4dac83f816b) 13:43:31 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 402.472384][T14247] loop2: detected capacity change from 0 to 262144 [ 402.506273][T14247] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 402.516231][T14247] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 402.600217][T14254] loop3: detected capacity change from 0 to 524288 [ 402.638574][T14254] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 402.654753][T14254] EXT4-fs (loop3): orphan cleanup on readonly fs [ 402.661612][T14254] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 402.676577][T14254] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:32 executing program 5: syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x4, 0x6101) 13:43:32 executing program 4: syz_open_dev$sndmidi(&(0x7f00000005c0)='/dev/snd/midiC#D#\x00', 0x0, 0x280000) 13:43:32 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 13:43:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:32 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(r0, 0x7b0, 0x0) [ 402.996658][T14271] loop2: detected capacity change from 0 to 262144 13:43:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 403.041973][T14275] loop3: detected capacity change from 0 to 524288 [ 403.056838][T14271] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:32 executing program 5: clock_gettime(0x0, &(0x7f0000000240)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={r0}, 0x0) 13:43:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 403.149308][T14271] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 403.190615][T14275] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:32 executing program 4: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 403.328759][T14275] EXT4-fs (loop3): orphan cleanup on readonly fs [ 403.389456][T14275] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 403.428722][T14275] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) open(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:33 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 13:43:33 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, 0x0) 13:43:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 403.662984][T14311] loop2: detected capacity change from 0 to 262144 [ 403.740165][T14311] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 403.775684][T14311] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 403.926959][T14327] loop3: detected capacity change from 0 to 524288 [ 403.942504][T14327] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 403.962262][T14327] EXT4-fs (loop3): orphan cleanup on readonly fs [ 403.968626][T14327] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 403.980679][T14327] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:33 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:33 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') clock_getres(0x3, &(0x7f0000002640)) ptrace$setopts(0x4206, r3, 0x6, 0x41) 13:43:33 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 13:43:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:33 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 404.345798][T14355] loop3: detected capacity change from 0 to 524288 [ 404.366712][T14359] IPVS: ftp: loaded support on port[0] = 21 [ 404.379437][T14354] loop2: detected capacity change from 0 to 262144 13:43:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 404.405196][T14355] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 404.427440][T14354] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 404.507257][T14354] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 404.523621][T14355] EXT4-fs (loop3): orphan cleanup on readonly fs [ 404.539231][ T35] audit: type=1804 audit(1607262214.012:38): pid=14380 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/250/bus" dev="sda1" ino=16374 res=1 errno=0 [ 404.565895][T14355] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 404.630271][T14359] IPVS: ftp: loaded support on port[0] = 21 13:43:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 404.693571][T14355] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 404.865773][ T35] audit: type=1804 audit(1607262214.342:39): pid=14415 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/251/bus" dev="sda1" ino=16369 res=1 errno=0 13:43:34 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') clock_getres(0x3, &(0x7f0000002640)) ptrace$setopts(0x4206, r3, 0x6, 0x41) 13:43:34 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 404.992602][T14427] loop2: detected capacity change from 0 to 262144 [ 405.071677][T14427] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 405.141523][T14440] loop3: detected capacity change from 0 to 524288 [ 405.143996][T14427] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 405.161309][ T35] audit: type=1804 audit(1607262214.642:40): pid=14448 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/252/bus" dev="sda1" ino=16383 res=1 errno=0 [ 405.299661][T14440] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 405.310158][T14452] IPVS: ftp: loaded support on port[0] = 21 [ 405.332516][T14440] EXT4-fs (loop3): orphan cleanup on readonly fs 13:43:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 405.342119][T14440] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 405.394076][T14440] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:35 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 405.763230][T14491] loop2: detected capacity change from 0 to 262144 13:43:35 executing program 5: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x579]}, 0x8}) [ 405.806077][T14497] loop3: detected capacity change from 0 to 524288 [ 405.832244][T14497] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:35 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 405.869491][T14497] EXT4-fs (loop3): orphan cleanup on readonly fs [ 405.878897][T14491] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 405.916693][T14497] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 [ 405.919576][T14491] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:35 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 405.965813][T14497] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) 13:43:35 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:35 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:35 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(r3) [ 406.331617][T14531] loop2: detected capacity change from 0 to 262144 13:43:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x8040, 0x0, 0x0) close(r3) [ 406.418872][T14531] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 406.443541][T14531] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000900)='/dev/vcs#\x00', 0x4, 0x0) write$cgroup_pid(r0, 0x0, 0x0) [ 406.577260][T14544] loop3: detected capacity change from 0 to 524288 13:43:36 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 406.640480][T14544] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 406.692451][T14544] EXT4-fs (loop3): orphan cleanup on readonly fs [ 406.698841][T14544] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 13:43:36 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 406.802109][T14544] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x8040, 0x0, 0x0) close(r3) 13:43:36 executing program 3: syz_genetlink_get_family_id$nl80211(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:36 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000080)) [ 406.920691][T14562] loop2: detected capacity change from 0 to 262144 [ 406.957108][T14562] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:36 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 406.983974][T14562] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x8040, 0x0, 0x0) close(r3) [ 407.089125][T14576] syz-executor.5 uses old SIOCAX25GETINFO 13:43:36 executing program 0: sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 407.237667][T14581] loop3: detected capacity change from 0 to 524288 13:43:36 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x3, &(0x7f0000000880)=[{&(0x7f0000000740)="0aeb5a79a06a908f559f802a95743cbe", 0x10, 0x716fd252}, {&(0x7f0000000780)="3c760212ca6a368a98ca03c49959a600397d73a24798a6a80cd0e2d59841d2fd605bf639e362ab", 0x27, 0x800}, {&(0x7f00000007c0)="0a01bc33a94f65224131f9e14940190de2285426fa056f7851ac3fb827101bac5ce27ef6c5382008f4138e5c503de222d2876dfec292dc0709afa24f7baaecfb9057845f36b6db7d5cefa039c3a78abb291b608f2adb78741b48761f080d7750733b3fcde01ba284e3e2f2bd670c98eb3b8ccd20b84024e62aceaaab7bbf0a7cb38bfd8dd269e4474a1f155d362b5349b4725bd554c6b5537f1f6bed", 0x9c}], 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0xa90, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x534, 0x5}, {0x3ff, 0xffff70d6}], r2}, 0x18, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfe99, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x29001}}}}}}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x50}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r5, &(0x7f0000000580)={0x0, 0xa, &(0x7f0000000240)={&(0x7f00000005c0)={0x4c, r6, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x888e}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x1c}]}, 0x4c}}, 0x0) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r6, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x6060) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 407.378122][T14581] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180), 0x0, 0x8040, 0x0, 0x0) close(r3) 13:43:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 407.457928][T14581] EXT4-fs (loop3): orphan cleanup on readonly fs [ 407.487348][T14581] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 13:43:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180), 0x0, 0x8040, 0x0, 0x0) close(r3) 13:43:37 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 407.593982][T14581] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue [ 407.619473][T14601] loop5: detected capacity change from 0 to 18850816 13:43:37 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 407.798586][T14613] loop2: detected capacity change from 0 to 262144 [ 407.826278][T14613] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 407.841033][T14613] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:37 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180), 0x0, 0x8040, 0x0, 0x0) close(r3) 13:43:37 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000900)='/dev/vcs#\x00', 0x4, 0x0) fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 13:43:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x0, 0x0, 0x0) close(r3) 13:43:37 executing program 4: syz_open_procfs(0x0, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 408.146602][T14634] loop3: detected capacity change from 0 to 524288 [ 408.177084][T14634] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:37 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) 13:43:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 408.222547][T14634] EXT4-fs (loop3): orphan cleanup on readonly fs [ 408.320557][T14634] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 33554432 13:43:37 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 408.393571][T14634] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:43:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x0, 0x0, 0x0) close(r3) 13:43:38 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x2039, 0x0, 0x0, 0x0, 0x0) 13:43:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:38 executing program 4: syz_open_procfs(0x0, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 408.558772][T14653] loop2: detected capacity change from 0 to 262144 13:43:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x0, 0x0, 0x0) close(r3) 13:43:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(0xffffffffffffffff) [ 408.694428][T14653] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 408.732061][T14653] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 408.755622][T14677] loop3: detected capacity change from 0 to 524288 13:43:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:38 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:38 executing program 4: syz_open_procfs(0x0, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:38 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x18, 0x110, 0xe, "f5"}], 0x28}}], 0x2, 0x0) 13:43:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(0xffffffffffffffff) 13:43:38 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 409.099679][T14694] loop3: detected capacity change from 0 to 524288 13:43:38 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x18, 0x110, 0xe, "f5"}], 0x28}}], 0x2, 0x0) 13:43:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0x96c, 0x4) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x3}}, 0x14) recvmmsg(r2, &(0x7f00000016c0)=[{{&(0x7f00000000c0)=@tipc, 0x80, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000440)=""/180, 0xb4}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5}}], 0x1, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7}, 0xd8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000180)="1b", 0x1, 0x8040, 0x0, 0x0) close(0xffffffffffffffff) 13:43:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:38 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 409.304878][T14711] loop2: detected capacity change from 0 to 262144 [ 409.341655][T14711] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:38 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 409.370249][T14711] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:38 executing program 5: socket(0x23, 0x0, 0x200000) [ 409.427298][T14724] loop3: detected capacity change from 0 to 524288 13:43:39 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:39 executing program 1: socket(0x0, 0x0, 0x100) 13:43:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:39 executing program 5: futex(0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 13:43:39 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:39 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:39 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f00000025c0)={&(0x7f0000002180)={{@hyper, 0x1f6}, {@any, 0x800}, 0x400, "e2ffece12aee2aa84558d579c9451533956890153e9cf7da59d310b9491af4d64a6663872c1520958656682ba43c31e064896c2ea6195f2703b4e8953a3fc2a25f245c504df70dd05a09131173c4912cfdbbdd405cfbc2718afde3b73731b3a02ac5781153b5e06cb35c601147d949582a1b029728f198de78808d92d790abfd7cc67d3c42465d901b00374d05725cc150e4265ac888f1d1e2941143ae061c6e972dc78b24a73c0f736d45ae9f9d4847fb8e24e7c12bd8ab85fe8d852de1091b81812d26a5486f31b7ea5d542fd8296b55369b1706aa6374e083b8b030061866b698c0ce0d2579f49dcf1e2f248dc50b83b8c11f5a09c8d077e652d3c8b5d70c51c0c3c3cb80574aabeefba1ce3da3762a58dacf2d2a9d551ba4bd3d2f3da5031c819f9717ac15c06caf026e613ef12c191b7754b09ac0425d43523c6924bc97097b96bad42356c2a5b718f43646dbcc2497e16634256987b32c04b49d0b9ed3c98a882a98ba959a828198a1de5816512052fbbd9f6bb0d735049abb651f4a149712fd1325fd1e3f1d32d4f04b3aaec31be19c01ea891bef7cef2dc03575d922141d6901fe9f9780550c45e9db46586c9dc0b7452cc622d7976ad23f3ed1ed549885c558e7141c07c8dcfa8d11d49fea3b51e6fb58f9be573cb640dec6f4cc6722c5618bf0dceef21e8bc7c1244ea146fc96ab830f0895c08dcfe41b69644b1c4497c410a391f3df877a79f009379422d2218739fa0f95e33dbee4d196af4945915f516f9dfe815c676840895d4c47c7819937f906c7f9df55af12a4cb5df4156a0bf1423acd202428c4d12ab3eec5646860eb4ad71c4ca37d4c733a9d4ab9bdcc10780b555fcdaee088a5cefab23e343b59a0c6c68f95ef6e923ae2bbd32f61b783d928d3bf00362d9d2f3ff79600af9d0340a32d842522f305c80e2f0ddd0de77731e9f8f75a76f99000a185c6a2d7def15dc5fcc010217e38c47d1b8fe7833215d10afa0c33d534f77b19188829186f9a1ded4a80f29488566ed11dbcd21bb0b98e2941b589da587304465022b61d4b491f2913e2add08630cf76c840bd3974c321cf2a4c17082dd27e84b9b1ab46aa697e863b7b3d79dd14ffa6d2135215a300472c826a404ccd9b1313a9bf1a9f7b2c765819007362e01f18708f75b3fe604167451e80bc96ae73df3731916878cd2c2a4b4b029d970a7b989ae08afa16242c24b6cb2f66f89178ed417740c1e316a6e0a636f2b5e9529dc6d50c9fb55bb6dbf0b872dc50019e70009c20adff487c2fd889c393025e7a7fd99963b32d092b33be14c78347cad90cfafe550bd901a4c8de660f617f0ea2fe459dac239a6b62661bf680915b92a316daa3d532e007d52ed37175aae368d9cfb2e139639cc12a6dad42eb68bf10c65c46ba0bcc80edfc4dba79b35ca506ca863439bb2a45ca"}, 0x418, 0x4}) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') [ 409.966673][T14748] loop3: detected capacity change from 0 to 524288 [ 410.100105][T14751] loop2: detected capacity change from 0 to 262144 13:43:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0xa90, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x534, 0x5}, {0x3ff, 0xffff70d6}], r2}, 0x18, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x29001}}}}}}]}, 0x48}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r4, 0x0, 0x0) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x6060) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 410.198154][T14751] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 410.208484][T14751] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:39 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 410.289652][T14770] loop3: detected capacity change from 0 to 524288 [ 410.302859][T14769] IPVS: ftp: loaded support on port[0] = 21 [ 410.345434][T14768] loop5: detected capacity change from 0 to 262144 13:43:39 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 410.466908][T14768] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 410.488678][T14765] IPVS: ftp: loaded support on port[0] = 21 13:43:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 410.528674][T14768] fscrypt (loop5, inode 2): Error -61 getting encryption context 13:43:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3f) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='$'], 0x28}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0x28}}], 0x2, 0x0) [ 410.633529][T14811] loop2: detected capacity change from 0 to 262144 [ 410.692818][T14811] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 410.704293][T14811] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:40 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, 0x0, &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 410.813224][T14836] loop3: detected capacity change from 0 to 524288 13:43:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:40 executing program 1: alarm(0xffffffffffffffff) 13:43:40 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x9a, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0x8000000000000000}]) 13:43:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:40 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, 0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001e000100413aff000000000007"], 0x28}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x332, 0x0) 13:43:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:40 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000140), 0x10) [ 411.345121][T14860] loop3: detected capacity change from 0 to 10752 [ 411.426091][T14865] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 411.450205][T14862] loop2: detected capacity change from 0 to 262144 [ 411.540912][T14860] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (10 blocks) 13:43:41 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, 0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 411.604418][T14862] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x0, 0x2]}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f00000001c0)) 13:43:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 411.727190][T14862] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xf000, 0x0, 0x9}, {}]}) 13:43:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:41 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, 0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000000080)=@allocspi={0x124, 0x16, 0x1, 0x0, 0x0, {{{@in=@dev, @in6=@mcast1}, {@in6=@loopback, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x70bd28, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x8}, [@sec_ctx={0xd, 0x8, {0x9, 0x8, 0x0, 0x0, 0x1, "fe"}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@empty}}]}, 0x124}}, 0x0) [ 411.988797][T14897] loop3: detected capacity change from 0 to 10752 13:43:41 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000900)='/dev/vcs#\x00', 0x4, 0x0) bind$phonet(r0, 0x0, 0x0) [ 412.095634][T14897] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (10 blocks) 13:43:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 412.152001][T14903] loop2: detected capacity change from 0 to 262144 [ 412.167277][T14903] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 412.177605][T14903] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:41 executing program 5: socket(0x1, 0x0, 0xfffffff9) 13:43:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:41 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:41 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000140)={0x23, 0x0, 0x3f}, 0x10) [ 412.496612][T14924] loop3: detected capacity change from 0 to 10752 13:43:42 executing program 5: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 13:43:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 412.637483][T14924] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (10 blocks) 13:43:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:42 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:42 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x0, 0x0, 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 412.929334][T14947] loop2: detected capacity change from 0 to 262144 13:43:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 412.994254][T14947] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 413.024097][T14947] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:42 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x0, 0x0, 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:42 executing program 5: fanotify_mark(0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffff, 0x0) 13:43:42 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x0, 0x0, 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:43 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000001040)='ns/pid\x00') 13:43:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 413.559150][T14979] loop2: detected capacity change from 0 to 262144 13:43:43 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 413.628774][T14979] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 413.673189][T14979] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:43 executing program 5: socket$packet(0x11, 0x3, 0x300) socketpair(0x11, 0xa, 0x5, &(0x7f0000000040)) 13:43:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:43 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:43 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xb}], 0x20}}], 0x2, 0x0) 13:43:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 414.113592][T15013] loop3: detected capacity change from 0 to 524288 [ 414.137518][T15013] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 414.217294][T15013] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 414.234075][T15013] EXT4-fs (loop3): get root inode failed 13:43:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) [ 414.295282][T15013] EXT4-fs (loop3): mount failed 13:43:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:43 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000040)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:44 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0x2}], 0x20}}], 0x2, 0x0) 13:43:44 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:44 executing program 1: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 414.682453][T15048] loop3: detected capacity change from 0 to 524288 [ 414.791966][T15048] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:44 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 414.876597][T15048] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x13, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x8}]}, 0x18}}, 0x0) [ 414.926902][T15048] EXT4-fs (loop3): get root inode failed [ 414.970547][T15048] EXT4-fs (loop3): mount failed 13:43:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:44 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:44 executing program 1: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={0x0}}, 0x0) 13:43:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 415.296193][T15081] loop3: detected capacity change from 0 to 524288 [ 415.314075][T15081] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:44 executing program 1: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 415.341109][T15081] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 415.353997][T15081] EXT4-fs (loop3): get root inode failed [ 415.359974][T15081] EXT4-fs (loop3): mount failed 13:43:44 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:44 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 415.454664][T15094] loop2: detected capacity change from 0 to 262144 13:43:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:45 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f00000025c0)={&(0x7f0000002180)={{@hyper, 0x1f6}, {@any, 0x800}, 0x400, "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"}, 0x418, 0x4}) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') clock_getres(0x3, &(0x7f0000002640)) openat$drirender128(0xffffffffffffff9c, &(0x7f0000002140)='/dev/dri/renderD128\x00', 0x18702, 0x0) ptrace$setopts(0x4206, r3, 0x6, 0x41) [ 415.519971][T15094] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 415.551798][T15094] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:45 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:45 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 415.824420][T15116] IPVS: ftp: loaded support on port[0] = 21 [ 415.872162][T15117] loop3: detected capacity change from 0 to 524288 13:43:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:45 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 415.946331][T15117] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 416.017157][T15117] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 416.053937][T15121] IPVS: ftp: loaded support on port[0] = 21 [ 416.078538][T15117] EXT4-fs (loop3): get root inode failed [ 416.087230][T15117] EXT4-fs (loop3): mount failed 13:43:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:45 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 416.170775][T15164] loop2: detected capacity change from 0 to 262144 [ 416.241221][T15164] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 416.270669][T11200] Bluetooth: hci0: command 0x0406 tx timeout [ 416.277083][T11200] Bluetooth: hci3: command 0x0406 tx timeout 13:43:45 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 416.315305][T15164] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:45 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 416.378291][T11200] Bluetooth: hci1: command 0x0406 tx timeout [ 416.400655][T11200] Bluetooth: hci4: command 0x0406 tx timeout [ 416.433318][T11200] Bluetooth: hci2: command 0x0406 tx timeout 13:43:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 416.475596][T11200] Bluetooth: hci5: command 0x0406 tx timeout 13:43:46 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) 13:43:46 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:46 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 416.565396][T15207] loop3: detected capacity change from 0 to 524288 13:43:46 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 416.634343][T15207] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 416.700875][T15207] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 416.719205][T15207] EXT4-fs (loop3): get root inode failed [ 416.725139][ T35] audit: type=1804 audit(1607262226.192:41): pid=15217 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/280/bus" dev="sda1" ino=15985 res=1 errno=0 13:43:46 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 416.782400][T15207] EXT4-fs (loop3): mount failed [ 416.796099][T15219] loop2: detected capacity change from 0 to 262144 [ 416.934516][T15219] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:46 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 416.987254][ T35] audit: type=1804 audit(1607262226.462:42): pid=15234 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/281/bus" dev="sda1" ino=16129 res=1 errno=0 [ 417.026026][T15219] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:46 executing program 5: openat$vmci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vmci\x00', 0x2, 0x0) 13:43:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:46 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:46 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 417.276232][ T35] audit: type=1804 audit(1607262226.752:43): pid=15246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/282/bus" dev="sda1" ino=15985 res=1 errno=0 [ 417.367599][T15249] loop3: detected capacity change from 0 to 524288 [ 417.405850][T15249] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:46 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) [ 417.435367][ T35] audit: type=1804 audit(1607262226.912:44): pid=15257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/283/bus" dev="sda1" ino=16383 res=1 errno=0 [ 417.450198][T15258] loop2: detected capacity change from 0 to 262144 13:43:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) [ 417.490771][T15249] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 417.505940][T15249] EXT4-fs (loop3): get root inode failed [ 417.516381][T15258] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:47 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 417.553297][T15249] EXT4-fs (loop3): mount failed [ 417.562163][ T35] audit: type=1804 audit(1607262227.042:45): pid=15273 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/284/bus" dev="sda1" ino=16381 res=1 errno=0 [ 417.576313][T15258] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:47 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2, 0x0) [ 417.822872][ T35] audit: type=1804 audit(1607262227.302:46): pid=15283 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir636657698/syzkaller.tuK5St/285/bus" dev="sda1" ino=15738 res=1 errno=0 13:43:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:47 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 417.918273][T15289] loop3: detected capacity change from 0 to 524288 [ 417.987945][T15289] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 418.042779][T15289] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 418.065578][T15289] EXT4-fs (loop3): get root inode failed [ 418.078618][T15297] loop2: detected capacity change from 0 to 262144 [ 418.082352][T15289] EXT4-fs (loop3): mount failed 13:43:47 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(0xffffffffffffffff, 0x450c, 0x0, 0x0, 0x0, 0x0) 13:43:47 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="000000000000000024001200110001006272696467b4e12f922940a89a0000000c0005"], 0x44}}, 0x0) [ 418.167797][T15297] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 418.244769][T15297] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:47 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:48 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 418.528407][T15329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 418.542885][T15330] loop3: detected capacity change from 0 to 524288 [ 418.581311][T15333] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 418.614720][T15330] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:48 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r1, @ANYBLOB="000000000000000024001200110001006272696467b4e12f922940a89a0000000c0005"], 0x44}}, 0x0) [ 418.664610][T15330] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 418.720990][T15330] EXT4-fs (loop3): get root inode failed [ 418.727109][T15344] loop2: detected capacity change from 0 to 262144 [ 418.729129][T15330] EXT4-fs (loop3): mount failed [ 418.760017][T15344] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:48 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='net/ptype\x00') r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee8000/0x3000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 418.780230][T15344] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) 13:43:48 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f00000025c0)={&(0x7f0000002180)={{@hyper, 0x1f6}, {@any, 0x800}, 0x400, "e2ffece12aee2aa84558d579c9451533956890153e9cf7da59d310b9491af4d64a6663872c1520958656682ba43c31e064896c2ea6195f2703b4e8953a3fc2a25f245c504df70dd05a09131173c4912cfdbbdd405cfbc2718afde3b73731b3a02ac5781153b5e06cb35c601147d949582a1b029728f198de78808d92d790abfd7cc67d3c42465d901b00374d05725cc150e4265ac888f1d1e2941143ae061c6e972dc78b24a73c0f736d45ae9f9d4847fb8e24e7c12bd8ab85fe8d852de1091b81812d26a5486f31b7ea5d542fd8296b55369b1706aa6374e083b8b030061866b698c0ce0d2579f49dcf1e2f248dc50b83b8c11f5a09c8d077e652d3c8b5d70c51c0c3c3cb80574aabeefba1ce3da3762a58dacf2d2a9d551ba4bd3d2f3da5031c819f9717ac15c06caf026e613ef12c191b7754b09ac0425d43523c6924bc97097b96bad42356c2a5b718f43646dbcc2497e16634256987b32c04b49d0b9ed3c98a882a98ba959a828198a1de5816512052fbbd9f6bb0d735049abb651f4a149712fd1325fd1e3f1d32d4f04b3aaec31be19c01ea891bef7cef2dc03575d922141d6901fe9f9780550c45e9db46586c9dc0b7452cc622d7976ad23f3ed1ed549885c558e7141c07c8dcfa8d11d49fea3b51e6fb58f9be573cb640dec6f4cc6722c5618bf0dceef21e8bc7c1244ea146fc96ab830f0895c08dcfe41b69644b1c4497c410a391f3df877a79f009379422d2218739fa0f95e33dbee4d196af4945915f516f9dfe815c676840895d4c47c7819937f906c7f9df55af12a4cb5df4156a0bf1423acd202428c4d12ab3eec5646860eb4ad71c4ca37d4c733a9d4ab9bdcc10780b555fcdaee088a5cefab23e343b59a0c6c68f95ef6e923ae2bbd32f61b783d928d3bf00362d9d2f3ff79600af9d0340a32d842522f305c80e2f0ddd0de77731e9f8f75a76f99000a185c6a2d7def15dc5fcc010217e38c47d1b8fe7833215d10afa0c33d534f77b19188829186f9a1ded4a80f29488566ed11dbcd21bb0b98e2941b589da587304465022b61d4b491f2913e2add08630cf76c840bd3974c321cf2a4c17082dd27e84b9b1ab46aa697e863b7b3d79dd14ffa6d2135215a300472c826a404ccd9b1313a9bf1a9f7b2c765819007362e01f18708f75b3fe604167451e80bc96ae73df3731916878cd2c2a4b4b029d970a7b989ae08afa16242c24b6cb2f66f89178ed417740c1e316a6e0a636f2b5e9529dc6d50c9fb55bb6dbf0b872dc50019e70009c20adff487c2fd889c393025e7a7fd99963b32d092b33be14c78347cad90cfafe550bd901a4c8de660f617f0ea2fe459dac239a6b62661bf680915b92a316daa3d532e007d52ed37175aae368d9cfb2e139639cc12a6dad42eb68bf10c65c46ba0bcc80edfc4dba79b35ca506ca863439bb2a45ca"}, 0x418, 0x4}) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') wait4(r3, 0x0, 0x0, 0x0) clock_getres(0x3, &(0x7f0000002640)) ptrace$setopts(0x4206, r3, 0x6, 0x41) 13:43:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 419.248897][T15368] loop3: detected capacity change from 0 to 524288 13:43:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0xb4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x84, 0x8, 0x0, 0x1, [{0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x58, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0xb4}}, 0x0) 13:43:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 419.391025][T15368] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 419.407036][T15375] IPVS: ftp: loaded support on port[0] = 21 [ 419.436973][T15368] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 419.516656][T15368] EXT4-fs (loop3): get root inode failed [ 419.524150][T15368] EXT4-fs (loop3): mount failed [ 419.538017][T15384] loop2: detected capacity change from 0 to 262144 [ 419.677556][T15384] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0xb4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x84, 0x8, 0x0, 0x1, [{0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x58, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x3, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0xb4}}, 0x0) 13:43:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 419.725275][T15384] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 419.806410][T15375] IPVS: ftp: loaded support on port[0] = 21 13:43:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) 13:43:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x29f, 0x0, 0x10}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)=0x3ff, 0x4) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 419.963424][T15424] loop3: detected capacity change from 0 to 524288 [ 419.991542][T15424] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110, 0xe}], 0x20}}], 0x2, 0x0) [ 420.002896][T15424] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 420.016326][T15424] EXT4-fs (loop3): get root inode failed [ 420.022193][T15424] EXT4-fs (loop3): mount failed [ 420.102381][T15441] loop2: detected capacity change from 0 to 262144 13:43:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0xb4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x84, 0x8, 0x0, 0x1, [{0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x7, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8}]}, 0xb4}}, 0x0) 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x0) 13:43:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 420.198702][T15441] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 420.305756][T15441] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x0) [ 420.354614][T15465] loop3: detected capacity change from 0 to 524288 13:43:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10b382) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002d00) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b7c9900edd07ea24914b090199add92ae18e13b1fbd14dade0b1769befaeb3d4c9755b1643069c10c5a53f00000000000000661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 13:43:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x0) [ 420.479715][T15465] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x1) [ 420.535104][T15465] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 420.589255][T15465] EXT4-fs (loop3): get root inode failed [ 420.597979][T15465] EXT4-fs (loop3): mount failed [ 420.603208][T15478] loop2: detected capacity change from 0 to 262144 [ 420.703728][T15478] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 420.752114][T15478] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) 13:43:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 13:43:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={0x0}}, 0x0) 13:43:50 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x29a100, 0x0) 13:43:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 421.135710][T15499] loop3: detected capacity change from 0 to 524288 [ 421.168438][T15501] loop2: detected capacity change from 0 to 262144 13:43:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 421.194318][T15499] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:50 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 13:43:50 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, 0x0, &(0x7f0000000080)) [ 421.254154][T15499] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 421.269632][T15501] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 421.289263][T15501] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 421.355906][T15499] EXT4-fs (loop3): get root inode failed [ 421.404756][T15499] EXT4-fs (loop3): mount failed 13:43:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 421.699832][T15528] loop3: detected capacity change from 0 to 524288 [ 421.729211][T15528] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 421.769277][T15528] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 421.815703][T15528] EXT4-fs (loop3): get root inode failed [ 421.827335][T15528] EXT4-fs (loop3): mount failed 13:43:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) 13:43:51 executing program 5: socket(0x22, 0x0, 0x84) 13:43:51 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f00000025c0)={&(0x7f0000002180)={{@hyper, 0x1f6}, {@any, 0x800}, 0x400, "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"}, 0x418, 0x4}) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') wait4(r3, 0x0, 0x0, 0x0) clock_getres(0x3, &(0x7f0000002640)) openat$drirender128(0xffffffffffffff9c, &(0x7f0000002140)='/dev/dri/renderD128\x00', 0x18702, 0x0) ptrace$setopts(0x4206, r3, 0x6, 0x41) 13:43:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:51 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 13:43:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 422.106646][T15543] loop3: detected capacity change from 0 to 524288 13:43:51 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 422.180495][T15545] loop2: detected capacity change from 0 to 262144 [ 422.187391][T15547] IPVS: ftp: loaded support on port[0] = 21 13:43:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x10006f1a, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) [ 422.232635][T15545] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 422.261589][T15545] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 422.333790][T15543] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 422.429768][T15543] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:51 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}], 0x10}}], 0x2, 0x0) [ 422.481364][T15583] IPVS: ftp: loaded support on port[0] = 21 13:43:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}], 0x10}}], 0x2, 0x0) [ 422.564703][T15543] EXT4-fs (loop3): get root inode failed 13:43:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) [ 422.609826][T15543] EXT4-fs (loop3): mount failed 13:43:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) 13:43:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 422.962652][T15616] loop3: detected capacity change from 0 to 524288 [ 422.997518][T15616] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:52 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x200200, 0x0) 13:43:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}], 0x10}}], 0x2, 0x0) 13:43:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x701, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) [ 423.045930][T15616] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0xf000}, {0x8000, 0x0, 0x7, 0xffffff08}, {0xe6, 0x7f, 0x5}, {0x27b7, 0x40, 0x2, 0x8}, {0x7f, 0x8, 0x9, 0x1}]}) [ 423.115688][T15616] EXT4-fs (loop3): get root inode failed [ 423.164067][T15616] EXT4-fs (loop3): mount failed [ 423.184972][T15625] loop2: detected capacity change from 0 to 262144 [ 423.253892][T15625] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 423.271692][T15625] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x0, 0xe}], 0x20}}], 0x2, 0x0) 13:43:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:52 executing program 4: syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x4e242) 13:43:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000140)=""/4096, &(0x7f0000000080)=0x1000) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r1, &(0x7f0000001500), 0x588, 0x0) 13:43:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x0, 0xe}], 0x20}}], 0x2, 0x0) [ 423.675453][T15647] loop3: detected capacity change from 0 to 524288 13:43:53 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) socket(0x1d, 0x0, 0x0) [ 423.742324][T15647] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 423.781128][T15647] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 423.793953][T15647] EXT4-fs (loop3): get root inode failed [ 423.799763][T15647] EXT4-fs (loop3): mount failed 13:43:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x0, 0xe}], 0x20}}], 0x2, 0x0) 13:43:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0xd, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) 13:43:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110}], 0x20}}], 0x2, 0x0) [ 424.153844][T15673] loop2: detected capacity change from 0 to 262144 [ 424.176400][T15675] loop3: detected capacity change from 0 to 524288 [ 424.191423][T14943] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 424.214666][T15675] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 424.234886][T15673] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 424.277892][T15675] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 424.306470][T15675] EXT4-fs (loop3): get root inode failed [ 424.315557][T15673] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 424.328802][T15675] EXT4-fs (loop3): mount failed 13:43:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:54 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110}], 0x20}}], 0x2, 0x0) [ 424.651240][T15697] loop3: detected capacity change from 0 to 524288 [ 424.679535][T15697] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 424.722947][T15702] loop2: detected capacity change from 0 to 262144 [ 424.740860][T15697] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:54 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10, 0x110}], 0x20}}], 0x2, 0x0) [ 424.777056][T15697] EXT4-fs (loop3): get root inode failed [ 424.784440][T14943] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 424.796830][T15702] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 424.814012][T14943] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 424.837395][T15697] EXT4-fs (loop3): mount failed [ 424.844722][T15702] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 424.861287][T14943] usb 5-1: Product: syz [ 424.872662][T14943] usb 5-1: Manufacturer: syz [ 424.880089][T14943] usb 5-1: SerialNumber: syz 13:43:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 424.961855][T14943] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 425.141903][T15720] loop3: detected capacity change from 0 to 524288 [ 425.166551][T15720] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 425.201618][T15720] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 425.208133][T15720] EXT4-fs (loop3): mount failed [ 425.684730][T14943] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 425.907335][T15661] can: request_module (can-proto-0) failed. [ 425.926205][ T9815] usb 5-1: USB disconnect, device number 3 [ 426.750576][T14943] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 426.758624][T14943] ath9k_htc: Failed to initialize the device [ 426.791130][ T9815] usb 5-1: ath9k_htc: USB layer deinitialized 13:43:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:43:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 427.227147][T15755] loop2: detected capacity change from 0 to 262144 [ 427.334283][T15759] loop3: detected capacity change from 0 to 524288 [ 427.373778][T15755] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x0, 0xe}], 0x10}}], 0x2, 0x0) [ 427.413633][T15759] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 427.441418][T15755] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:57 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r0, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 427.556718][T15759] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 427.627294][T15759] EXT4-fs (loop3): mount failed 13:43:57 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x0, 0xe}], 0x10}}], 0x2, 0x0) [ 427.830702][T15777] loop2: detected capacity change from 0 to 262144 13:43:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 427.965184][T15777] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 428.039591][T15777] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:43:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:57 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x0, 0xe}], 0x10}}], 0x2, 0x0) 13:43:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) 13:43:57 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r0, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:57 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110}], 0x10}}], 0x2, 0x0) [ 428.282504][T15787] loop3: detected capacity change from 0 to 524288 13:43:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newqdisc={0x3c, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_WASH={0x8}]}}]}, 0x3c}}, 0x0) [ 428.505467][T15787] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 428.575742][T15787] EXT4-fs (loop3): corrupt root inode, run e2fsck 13:43:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110}], 0x10}}], 0x2, 0x0) [ 428.638382][T15787] EXT4-fs (loop3): mount failed [ 428.706560][T15804] loop2: detected capacity change from 0 to 262144 [ 428.787150][T15804] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 428.789004][T15806] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:43:58 executing program 4: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000cc0)=[{&(0x7f00000008c0)='\n', 0x1}, {&(0x7f0000000900)="36c97b58ca71097818d1da4e70c1ec2d3b5e38af2b4495cfde888055311e9a0ddf87bb0e9606ba3833c07f1378892358ae1e06ec5803ea0cb5e349627326ed019299972f892da67ee17a05cfe19f058b7d0424f6195315c0495fe8", 0x5b, 0x40}], 0x0, 0x0) [ 428.829035][T15804] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 428.845352][T15806] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:43:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:58 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r0, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110}], 0x10}}], 0x2, 0x0) 13:43:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000040)=0x98) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x588, 0x0) [ 429.295317][T15827] loop3: detected capacity change from 0 to 524288 13:43:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0xb4, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x84, 0x8, 0x0, 0x1, [{0x80, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x58, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x4}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8}]}, 0xb4}}, 0x0) 13:43:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x1, 0x0) 13:43:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x8000}]}) [ 429.339722][T15829] loop2: detected capacity change from 0 to 262144 [ 429.401850][T15827] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 429.419992][T15829] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 429.461940][T15829] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 429.473407][T15827] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 429.487259][T15827] EXT4-fs (loop3): get root inode failed [ 429.493079][T15827] EXT4-fs (loop3): mount failed 13:43:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 429.704754][T15849] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 13:43:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x1, 0x0) [ 429.867416][T15853] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 429.889446][T15854] loop3: detected capacity change from 0 to 524288 [ 429.932448][T15854] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:43:59 executing program 4: socket(0x25, 0x5, 0xf6) 13:43:59 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000002100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r0, 0x7a4, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000002040)='/dev/vcs#\x00', 0x8, 0x400200) read$FUSE(r1, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r0, 0x7ab, &(0x7f00000025c0)={&(0x7f0000002180)={{@hyper, 0x1f6}, {@any, 0x800}, 0x400, "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"}, 0x418, 0x4}) syz_open_procfs$namespace(r2, &(0x7f00000020c0)='ns/uts\x00') unshare(0x40000200) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000002080)={0x1, 0x7, 0x0}) r3 = getpid() syz_genetlink_get_family_id$nbd(&(0x7f0000002600)='nbd\x00') wait4(r3, 0x0, 0x0, 0x0) clock_getres(0x3, &(0x7f0000002640)) openat$drirender128(0xffffffffffffff9c, &(0x7f0000002140)='/dev/dri/renderD128\x00', 0x18702, 0x0) ptrace$setopts(0x4206, r3, 0x6, 0x41) socket(0x21, 0x2, 0x0) [ 430.038227][T15854] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:43:59 executing program 4: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) socket(0x1d, 0x6, 0x0) [ 430.134930][T15854] EXT4-fs (loop3): get root inode failed [ 430.143085][T15854] EXT4-fs (loop3): mount failed [ 430.167527][T15865] IPVS: ftp: loaded support on port[0] = 21 13:43:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x1, 0x0) 13:43:59 executing program 0: syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x121380) [ 430.196356][T15867] loop2: detected capacity change from 0 to 262144 [ 430.220700][T15867] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:43:59 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000020c0)='ns/uts\x00') [ 430.298413][T15867] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 430.322333][T15868] IPVS: ftp: loaded support on port[0] = 21 13:43:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:43:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:43:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_io_uring_setup(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, [0x2]}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140), &(0x7f00000001c0)) 13:44:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) [ 430.570701][ T5] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 430.578973][T15928] loop3: detected capacity change from 0 to 524288 13:44:00 executing program 0: fanotify_init(0x6, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 430.641867][T15928] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:44:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000100)={0x78, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x50, 0x8, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x24, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x4, 0x0, 0x0, 0x0}]}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x78}}, 0x0) 13:44:00 executing program 5: socket(0xa, 0x0, 0xfffffff9) [ 430.733005][T15928] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 430.747320][T15928] EXT4-fs (loop3): get root inode failed [ 430.758960][T15928] EXT4-fs (loop3): mount failed [ 430.776373][T15935] loop2: detected capacity change from 0 to 262144 13:44:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) [ 430.907929][T15935] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 430.955797][T15935] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 431.150968][ T5] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 431.173572][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 431.204945][ T5] usb 5-1: Product: syz [ 431.233551][ T5] usb 5-1: Manufacturer: syz [ 431.252347][ T5] usb 5-1: SerialNumber: syz [ 431.340247][ T5] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 431.940525][ T5] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 432.228229][T15896] can: request_module (can-proto-0) failed. [ 432.239004][T14941] usb 5-1: USB disconnect, device number 5 [ 432.991069][ T5] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 433.007082][ T5] ath9k_htc: Failed to initialize the device [ 433.021016][T14941] usb 5-1: ath9k_htc: USB layer deinitialized 13:44:02 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000200)={0xc4f}, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x579]}, 0x8}) 13:44:02 executing program 0: futex(0x0, 0xd, 0x0, &(0x7f0000000280), 0x0, 0x0) 13:44:02 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:02 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0xc00) 13:44:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 433.440422][T14941] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 433.551264][T15982] loop2: detected capacity change from 0 to 262144 13:44:03 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x10c4, 0xea90, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000001200)={0x2c, &(0x7f0000001700)=ANY=[@ANYBLOB="00aa2a"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="20010e"], 0x0}) [ 433.598590][T15985] loop3: detected capacity change from 0 to 524288 13:44:03 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x700}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}]}, 0x30}}, 0x0) [ 433.690047][T15982] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:03 executing program 0: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) socket(0x0, 0x6, 0x0) [ 433.766193][T15985] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 433.769778][T15982] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 433.845033][T15985] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:03 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r0, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 433.892352][T15985] EXT4-fs (loop3): get root inode failed [ 433.898265][T15985] EXT4-fs (loop3): mount failed 13:44:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', 0x0, 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 434.131982][T16011] loop4: detected capacity change from 0 to 262144 [ 434.153960][T14943] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 434.221876][T16011] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 434.260573][T11200] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 434.271974][T16023] loop2: detected capacity change from 0 to 262144 [ 434.293906][T16011] fscrypt (loop4, inode 2): Error -61 getting encryption context [ 434.308444][T16025] loop3: detected capacity change from 0 to 524288 13:44:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) [ 434.309281][T16023] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 434.329984][T16023] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 434.381675][T16025] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 434.414830][T16025] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 434.435715][T16025] EXT4-fs (loop3): get root inode failed [ 434.521642][T16025] EXT4-fs (loop3): mount failed 13:44:04 executing program 4: socket(0x48, 0x0, 0x0) [ 434.571224][T14943] usb 6-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 434.605851][T14943] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 13:44:04 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 434.657186][T14943] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 434.723831][T14943] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 434.795314][T14943] usb 6-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.40 [ 434.800541][T11200] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 434.837206][T14943] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 434.849929][T11200] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 434.874179][T11200] usb 1-1: Product: syz [ 434.883596][T11200] usb 1-1: Manufacturer: syz [ 434.892641][T14943] usb 6-1: config 0 descriptor?? [ 434.897026][T11200] usb 1-1: SerialNumber: syz [ 434.898979][T16043] loop3: detected capacity change from 0 to 524288 [ 434.941503][T11200] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 434.942991][T16043] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 434.965195][T16043] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 434.980055][T16043] EXT4-fs (loop3): get root inode failed [ 434.987668][T16043] EXT4-fs (loop3): mount failed [ 435.410407][T14943] cp2112 0003:10C4:EA90.0005: unknown main item tag 0x0 [ 435.442065][T14943] cp2112 0003:10C4:EA90.0005: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.5-1/input0 [ 435.540560][T15658] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 435.620557][T14943] cp2112 0003:10C4:EA90.0005: Part Number: 0x00 Device Version: 0x00 [ 435.802094][ T5] usb 1-1: USB disconnect, device number 2 [ 435.860831][T14943] cp2112 0003:10C4:EA90.0005: error requesting SMBus config [ 435.901024][T14943] cp2112: probe of 0003:10C4:EA90.0005 failed with error -71 [ 435.934624][T14943] usb 6-1: USB disconnect, device number 2 [ 436.590614][T15658] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 436.599922][T15658] ath9k_htc: Failed to initialize the device [ 436.606688][T15660] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 436.644148][ T5] usb 1-1: ath9k_htc: USB layer deinitialized [ 436.970614][T15660] usb 6-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 437.030498][ T5] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 437.047831][T15660] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 437.073983][T15660] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 437.095878][T15660] usb 6-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 437.117469][T15660] usb 6-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.40 [ 437.126643][T15660] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 437.145091][T15660] usb 6-1: config 0 descriptor?? 13:44:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8933, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:06 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 13:44:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', 0x0, 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:06 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:06 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) clock_gettime(0x4, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd4, r1, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x240000c0}, 0x10) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x0, 0x40) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xa001241}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x240408e0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f00000003c0)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x1) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x24, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000044) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x48, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1bfd04e7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffb}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000001}, 0x8004) r3 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x697b, 0x482800) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x4) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000800)) syz_mount_image$exfat(&(0x7f0000000840)='exfat\x00', &(0x7f0000000880)='./file0\x00', 0xefa, 0x6, &(0x7f0000000cc0)=[{&(0x7f00000008c0)="0ac3aad4a95e18897780709120a23fbab81c89b702584afeab39556b7b63", 0x1e, 0x4d}, {&(0x7f0000000900)="36c97b58ca71097818d1da4e70c1ec2d3b5e38af2b4495cfde888055311e9a0ddf87bb0e9606ba3833c07f1378892358ae1e06ec5803ea0cb5e349627326ed019299972f892da67ee17a05cfe19f058b7d0424f6195315c0495fe8de842ea04d0d4ae8e894196b9780104e739651dc5952cb1d6c50e801437ca7a9f3a82bd5eb21ff4337b7a92f49fda4eb65a2c544a15f66b0a6d8d183bee705421510c523c5a75015bf501f78842a1c13f07133527470635a57f1c9c8c8d572feb242a91b111dfb6c87fa24f02ce43cc00acc8a2483c768", 0xd2, 0x40}, {&(0x7f0000000a00)="4af86ca3f5a652a2f14bdd19fc0c4d888dfbc08a1d67d752cbbfe208c4befe13d826ced423be8a30a83e13bf4aee3ecdc5255e69f49f0a30c37b6ad8c8cf6910cde2b7a9bcd33e7f5cee10f756632c54f9c4d3f16549083b0a3e04d5718a60d5bf10eb7ccd941185a98af10dcfc6f07ca98facd9784ce68dbef523fb791787c725a2fdc584935a484c9f6828b7f261c7a7dad0868b881391f304d5b743e2673ea5734e902393733585f54c89bb3650454770a5b4fade1bbc749a80af4c9a3b4a4cb1c969d1d30a696d3bd016f7cb2a688b8419ec51ecd47a41c5547e899ae917c340dc8a97b5bbdf3be3b7c4d248d2247ff79d", 0xf3, 0x3}, {&(0x7f0000000b00)="267354223647a79390736405fa0c5e9073847037fed76cb8765b655bf348593158ddfb2001ae94c9fdfcba2bd2d06c7058dcea9d1988e8dc8e148d84aee54c9e80a95ab494e8adc538d08844a4e1f671b1853a", 0x53, 0x101}, {&(0x7f0000000b80)="02ffe6d032cf156127d728a223eb7bdcca79cc2ae0439029a7e98dc168357b79ce66f024edeeac243fd46da81f7e1042c73f572fff9c144af2d637e78f2b01e2cb0a74913537074072b7f8c675dd6612442228f9be0dea03617ab72f96a73e429a5f8d89df593f9e80b2b86d5da74794754b46a141ff91c6a00b2bebb654e6d6f70182c051915f56b308ecba2566fa9bd5bc0e5a31ebff9ae95dad141d35dc63d3282f24e5fb417af2c5cdaacd88ab144da844ad836f71f90e9ce96cd832d3cab6a0e53014316c757a13e731dc3b02b6", 0xd0, 0x2}, {&(0x7f0000000c80)="1734f11fc81c72", 0x7, 0x1}], 0x4002, &(0x7f0000000d80)={[{@utf8='utf8'}, {@utf8='utf8'}, {@namecase='namecase=1'}], [{@smackfshat={'smackfshat', 0x3d, 'devlink\x00'}}, {@obj_type={'obj_type', 0x3d, 'netdevsim'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) [ 437.380693][T15660] usbhid 6-1:0.0: can't add hid device: -71 [ 437.386771][T15660] usbhid: probe of 6-1:0.0 failed with error -71 [ 437.431746][T16093] loop2: detected capacity change from 0 to 262144 [ 437.439669][T15660] usb 6-1: USB disconnect, device number 3 [ 437.466047][ T35] audit: type=1326 audit(1607262246.942:47): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16090 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 437.495020][T16097] loop3: detected capacity change from 0 to 524288 13:44:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8953, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 437.531766][T16104] loop0: detected capacity change from 0 to 3584 [ 437.560232][T16097] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 437.576220][T16104] exfat: Deprecated parameter 'utf8' [ 437.593927][T16097] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 437.607132][T16093] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 437.614782][T16104] exfat: Deprecated parameter 'utf8' 13:44:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) [ 437.662453][T16093] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 437.690138][T16104] exfat: Deprecated parameter 'namecase' [ 437.705139][T16097] EXT4-fs (loop3): get root inode failed 13:44:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x3d}]}) [ 437.722561][T16104] exfat: Unknown parameter 'smackfshat' [ 437.730191][T16097] EXT4-fs (loop3): mount failed 13:44:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', 0x0, 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0xdfd2}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x18}}], 0x1, 0x0) 13:44:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) [ 438.053746][T16132] loop2: detected capacity change from 0 to 262144 13:44:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) [ 438.099442][T16135] loop3: detected capacity change from 0 to 524288 [ 438.175614][T16132] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 438.185434][T16135] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 438.205336][T16132] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 438.236127][T16135] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 438.248954][ T35] audit: type=1326 audit(1607262247.722:48): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16090 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 438.334182][T16135] EXT4-fs (loop3): get root inode failed [ 438.343642][T16148] loop0: detected capacity change from 0 to 3584 [ 438.361667][T16148] exfat: Deprecated parameter 'utf8' [ 438.400413][T16135] EXT4-fs (loop3): mount failed [ 438.410247][T16148] exfat: Deprecated parameter 'utf8' [ 438.437780][T16148] exfat: Deprecated parameter 'namecase' 13:44:07 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) clock_gettime(0x4, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd4, r1, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x240000c0}, 0x10) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r2 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x0, 0x40) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xa001241}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x240408e0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f00000003c0)) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x1) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x24, 0x0, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000044) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x48, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1bfd04e7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffb}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000001}, 0x8004) r3 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x697b, 0x482800) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x4) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000800)) syz_mount_image$exfat(&(0x7f0000000840)='exfat\x00', &(0x7f0000000880)='./file0\x00', 0xefa, 0x6, &(0x7f0000000cc0)=[{&(0x7f00000008c0)="0ac3aad4a95e18897780709120a23fbab81c89b702584afeab39556b7b63", 0x1e, 0x4d}, {&(0x7f0000000900)="36c97b58ca71097818d1da4e70c1ec2d3b5e38af2b4495cfde888055311e9a0ddf87bb0e9606ba3833c07f1378892358ae1e06ec5803ea0cb5e349627326ed019299972f892da67ee17a05cfe19f058b7d0424f6195315c0495fe8de842ea04d0d4ae8e894196b9780104e739651dc5952cb1d6c50e801437ca7a9f3a82bd5eb21ff4337b7a92f49fda4eb65a2c544a15f66b0a6d8d183bee705421510c523c5a75015bf501f78842a1c13f07133527470635a57f1c9c8c8d572feb242a91b111dfb6c87fa24f02ce43cc00acc8a2483c768", 0xd2, 0x40}, {&(0x7f0000000a00)="4af86ca3f5a652a2f14bdd19fc0c4d888dfbc08a1d67d752cbbfe208c4befe13d826ced423be8a30a83e13bf4aee3ecdc5255e69f49f0a30c37b6ad8c8cf6910cde2b7a9bcd33e7f5cee10f756632c54f9c4d3f16549083b0a3e04d5718a60d5bf10eb7ccd941185a98af10dcfc6f07ca98facd9784ce68dbef523fb791787c725a2fdc584935a484c9f6828b7f261c7a7dad0868b881391f304d5b743e2673ea5734e902393733585f54c89bb3650454770a5b4fade1bbc749a80af4c9a3b4a4cb1c969d1d30a696d3bd016f7cb2a688b8419ec51ecd47a41c5547e899ae917c340dc8a97b5bbdf3be3b7c4d248d2247ff79d", 0xf3, 0x3}, {&(0x7f0000000b00)="267354223647a79390736405fa0c5e9073847037fed76cb8765b655bf348593158ddfb2001ae94c9fdfcba2bd2d06c7058dcea9d1988e8dc8e148d84aee54c9e80a95ab494e8adc538d08844a4e1f671b1853a", 0x53, 0x101}, {&(0x7f0000000b80)="02ffe6d032cf156127d728a223eb7bdcca79cc2ae0439029a7e98dc168357b79ce66f024edeeac243fd46da81f7e1042c73f572fff9c144af2d637e78f2b01e2cb0a74913537074072b7f8c675dd6612442228f9be0dea03617ab72f96a73e429a5f8d89df593f9e80b2b86d5da74794754b46a141ff91c6a00b2bebb654e6d6f70182c051915f56b308ecba2566fa9bd5bc0e5a31ebff9ae95dad141d35dc63d3282f24e5fb417af2c5cdaacd88ab144da844ad836f71f90e9ce96cd832d3cab6a0e53014316c757a13e731dc3b02b6", 0xd0, 0x2}, {&(0x7f0000000c80)="1734f11fc81c72", 0x7, 0x1}], 0x4002, &(0x7f0000000d80)={[{@utf8='utf8'}, {@utf8='utf8'}, {@namecase='namecase=1'}], [{@smackfshat={'smackfshat', 0x3d, 'devlink\x00'}}, {@obj_type={'obj_type', 0x3d, 'netdevsim'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 13:44:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x2, 0x0, 0x0, 0x102a}]}) 13:44:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8936, &(0x7f0000000840)={'ip6tnl0\x00', 0x0}) 13:44:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 438.456809][T16148] exfat: Unknown parameter 'smackfshat' 13:44:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:08 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x10, 0x110, 0x1}], 0x10}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip_vti0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast2}}}}) 13:44:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a3, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 438.737453][ T35] audit: type=1326 audit(1607262248.212:49): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16167 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 438.763922][T16168] loop2: detected capacity change from 0 to 262144 13:44:08 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x10, 0x110, 0x1}], 0x10}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:08 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0x13}, 0x10) [ 438.825566][T16168] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 438.863593][T16176] loop0: detected capacity change from 0 to 3584 [ 438.901328][T16168] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 438.915536][T16176] exfat: Deprecated parameter 'utf8' [ 438.921793][T16183] loop3: detected capacity change from 0 to 524288 [ 438.933207][T16183] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 438.943831][T16176] exfat: Deprecated parameter 'utf8' 13:44:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 438.949236][T16176] exfat: Deprecated parameter 'namecase' [ 438.955123][T16176] exfat: Unknown parameter 'smackfshat' [ 439.051179][T16183] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 439.109781][T16183] EXT4-fs (loop3): get root inode failed [ 439.152795][T16183] EXT4-fs (loop3): mount failed 13:44:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@call], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:09 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[{0x10, 0x110, 0x1}], 0x10}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x110, 0xe}], 0x10}}], 0x2, 0x0) 13:44:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 13:44:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x2d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000ec0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000000)="4616d87565aaf7405ee2b804aeb0f1c17db552ed434bca0a4164914dda48c537569cd6d9dc9e351278ecd6e5ae789d314226676bf6ef8e9e2c8cc2c7ab67ec319fddb6f4e92429b9ed4d04ddd29ce954856cab1f084f39556473064e28d3a7eb488ca893018de5d8e96f25c0d8ffc428add24836", 0x74}, {&(0x7f0000000100)="0f1cb086d2206a0a52bfac", 0xb}], 0x2, &(0x7f00000006c0)=[@tclass={{0x14, 0x29, 0x43, 0x401}}, @hopopts_2292={{0x198, 0x29, 0x36, {0x32, 0x2f, [], [@pad1, @hao={0xc9, 0x10, @empty}, @ra, @generic={0x0, 0x9a, "017663b41a92d8e57996b6a383f28f076e79a6691295735a4a4ce86fb777f75d0350b4d7e69cfcd133b1023cad010e85129b86cc1a8bd0d53d95030d3997b0b607050979b64ee7eaa68af8ce922d29a12163777f46ebf5061546a9a1789aa8ca3706ad780f8c50e821d6a3bdaedcd5d6a2eacbaf88faf0456477187377d16cd793734afa48ea7b3c8e54257a87ad6651a59356cd0b238bfef381"}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x8}, @generic={0xa4, 0xb0, "cc8959d18714e4d4c4825c8d7d1135c7cdd9e458b4029b687311f1ee795d05685b4b428208485ffb2c618ee46d6da92f4e39d5f4ebbc53f74a02b5678d0930c1134b8779004fc04cd5bfcd50d585d3ea97750fc3495eafe7e95cb26a520f049bbc0c4d59f9e16b2949b06ab8bc2e6a5fabed8f4f24f069c3322702e8fec916c6ca9e2d7706115f7d8a0e9190413931fb67c47add4c58c834ac9fafa1ef0d640234a3dfb17de562d1a0269fba3100f0d3"}, @pad1, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}], 0x1f0}}], 0x1, 0x40001) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x890b, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 439.626480][T16209] loop3: detected capacity change from 0 to 524288 13:44:09 executing program 1: unshare(0x42000000) syz_open_procfs(0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(0xffffffffffffffff, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0}, 0x2020) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a", 0x5d}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118}, 0x0) 13:44:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f00000001c0)=@raw=[@map_val], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 439.685870][T16211] loop2: detected capacity change from 0 to 262144 [ 439.716114][T16209] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 13:44:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x16}]}) [ 439.736680][T16211] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 439.760262][T16211] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 439.785246][T16209] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 439.860844][T16209] EXT4-fs (loop3): get root inode failed [ 439.866558][T16209] EXT4-fs (loop3): mount failed 13:44:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) read$FUSE(r0, &(0x7f0000001840)={0x2020}, 0x2020) [ 439.909390][T16230] IPVS: ftp: loaded support on port[0] = 21 13:44:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 440.095274][ T35] audit: type=1326 audit(1607262249.572:50): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16231 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:09 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0xfe847ab038a80ce4) 13:44:09 executing program 4: socket(0x10, 0x0, 0x242c) [ 440.239499][T16261] loop2: detected capacity change from 0 to 262144 [ 440.249904][T16230] IPVS: ftp: loaded support on port[0] = 21 [ 440.319351][T16265] loop3: detected capacity change from 0 to 524288 [ 440.332736][T16261] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 440.403720][T16265] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 440.422639][T16261] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 440.504129][T16265] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 440.568562][T16265] EXT4-fs (loop3): get root inode failed [ 440.575157][T16265] EXT4-fs (loop3): mount failed 13:44:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a1, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:10 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 13:44:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:10 executing program 1: unshare(0x22040400) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 13:44:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 440.714352][ T35] audit: type=1326 audit(1607262250.192:51): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16231 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x2, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x3, 0x10, r0, 0x0) [ 440.954216][T16310] loop2: detected capacity change from 0 to 262144 13:44:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002940)=[{{&(0x7f0000000000)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000002500)=[@ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x10}}], 0x28}}], 0x1, 0x0) [ 441.017926][T16310] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 441.056059][T16310] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 441.066000][T16318] loop3: detected capacity change from 0 to 524288 13:44:10 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0x5) 13:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}}) [ 441.145128][T16318] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 13:44:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:10 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000006c0)={0x2020}, 0x2020) [ 441.253953][T16318] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 441.287956][T16318] EXT4-fs (loop3): get root inode failed 13:44:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/tty/drivers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000006c0)={0x2020}, 0x2020) 13:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 441.358827][T16318] EXT4-fs (loop3): mount failed 13:44:10 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x68000, 0x0) clone(0x501ac480, 0x0, 0x0, 0x0, 0x0) [ 441.407087][T16335] loop2: detected capacity change from 0 to 262144 13:44:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 441.495190][T16335] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 441.528293][T16335] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000003980)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, 0x0) [ 441.628745][T16346] IPVS: ftp: loaded support on port[0] = 21 13:44:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000a00)={'erspan0\x00', 0x0}) 13:44:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@private2, @remote, @empty, 0x0, 0x8}) [ 441.841719][T16352] loop3: detected capacity change from 0 to 524288 13:44:11 executing program 5: unshare(0x20000000) [ 441.897418][T16352] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 441.997719][T16352] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 442.023251][T16352] EXT4-fs (loop3): get root inode failed [ 442.037433][T16352] EXT4-fs (loop3): mount failed [ 442.061882][T16374] loop2: detected capacity change from 0 to 262144 [ 442.189352][T16374] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x891d, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 442.231607][T16374] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, 0x0) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102}, @nl=@unspec, @l2tp={0x2, 0x0, @remote}}) [ 442.541670][T16389] loop3: detected capacity change from 0 to 524288 [ 442.624032][T16389] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 442.697975][T16393] loop2: detected capacity change from 0 to 262144 13:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000022c0)={'ip6gre0\x00', 0x0}) [ 442.829672][T16389] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 442.860770][T16393] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 442.873603][T16393] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 442.941367][T16389] EXT4-fs (loop3): get root inode failed [ 442.980407][T16389] EXT4-fs (loop3): mount failed 13:44:17 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='gid_map\x00') 13:44:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000006780)={'gre0\x00', &(0x7f0000006700)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private=0xa010102, @empty}}}}) 13:44:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000a00)={'tunl0\x00', &(0x7f0000000940)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 13:44:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)=ANY=[]}) 13:44:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, 0x0) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0xc0189436, &(0x7f0000000140)) 13:44:17 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001280)='/proc/thread-self\x00', 0x0, 0x0) 13:44:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 447.927391][T16441] loop3: detected capacity change from 0 to 524288 [ 447.965713][T16440] loop2: detected capacity change from 0 to 262144 [ 447.999494][T16441] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 448.009632][T16440] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 448.019923][T16440] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x0, 0x1}, 0x20) [ 448.047326][T16441] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 448.104913][T16441] EXT4-fs (loop3): get root inode failed 13:44:17 executing program 4: sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffffff7f) [ 448.185147][T16441] EXT4-fs (loop3): mount failed 13:44:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, 0x0) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @multicast1}}}) 13:44:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fowner_lt={'fowner<', 0xee01}}]}}) 13:44:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002dc0)='comm\x00') read$FUSE(r0, 0x0, 0x0) 13:44:18 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) 13:44:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8942, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 448.460661][T16473] fuse: Unknown parameter 'fowner<00000000000000060929' [ 448.480209][T16474] loop2: detected capacity change from 0 to 262144 [ 448.542752][T16479] loop3: detected capacity change from 0 to 524288 [ 448.572593][ T35] audit: type=1326 audit(1607262258.052:52): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16483 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 448.597012][T16474] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 448.617709][T16479] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 448.623649][T16474] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002700)={0x2020}, 0x4c9) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 13:44:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000740)='pagemap\x00') [ 448.665097][T16479] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8943, &(0x7f00000000c0)={'sit0\x00', 0x0}) 13:44:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x3}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 448.786287][T16479] EXT4-fs (loop3): get root inode failed 13:44:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 448.845497][T16479] EXT4-fs (loop3): mount failed 13:44:18 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000003980)='/dev/usbmon#\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000000c0)={0x0, 0x0, 0x9c0}) 13:44:18 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 13:44:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 449.018401][T16506] loop2: detected capacity change from 0 to 262144 [ 449.059238][T16506] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 449.113609][T16506] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 449.160532][T16519] loop3: detected capacity change from 0 to 524288 [ 449.172504][T16519] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 449.223674][T16519] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 449.257533][T16519] EXT4-fs (loop3): get root inode failed [ 449.269955][T16519] EXT4-fs (loop3): mount failed [ 449.388200][ T35] audit: type=1326 audit(1607262258.862:53): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16483 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 13:44:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x20}]}) 13:44:18 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RSTATFS(r0, &(0x7f0000000040)={0x43}, 0x43) write$P9_RWALK(r0, &(0x7f0000000100)={0x9}, 0x9) 13:44:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 449.540019][T16533] loop2: detected capacity change from 0 to 262144 [ 449.572646][T16539] loop3: detected capacity change from 0 to 524288 13:44:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) 13:44:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000ec0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)="0f1cb086d2206a0a52", 0x9}], 0x1}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x890b, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 449.616817][T16539] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 449.617017][T16533] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:19 executing program 5: syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 449.679714][T16533] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 449.696010][T16539] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated [ 449.758660][T16539] EXT4-fs (loop3): get root inode failed [ 449.768677][T16539] EXT4-fs (loop3): mount failed 13:44:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x2d}]}) 13:44:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8991, &(0x7f0000000a00)={'tunl0\x00', &(0x7f0000000940)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 13:44:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 13:44:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x2}, 0x20) [ 450.033204][T16565] loop2: detected capacity change from 0 to 262144 13:44:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0xc30434113a63c7a3, 0x2, &(0x7f00000001c0)=@raw=[@map_val], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x2}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000003b80)={0x1b, 0x0, 0x0, 0x0, 0x47, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x40) [ 450.114514][T16565] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 450.141325][T16572] loop3: detected capacity change from 0 to 524288 [ 450.205062][T16565] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 450.221552][T16572] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 13:44:19 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) [ 450.304764][T16572] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:19 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001280)=[{&(0x7f0000000280)="5e97fef0e6ed8437bda9e642bd3fbc4d43088ccbf890a81255fc6c8959d296544e59adb9372b0be0a08aca99d31de43c714da59bafbdd97db16acfff504c86d6f4216a244401d7ab258f8147801d782380eb3dcdf4b5a85d99dda7f58cd9e9f5193ee71ec7500c3083efb75206fc2bad24b3a4c06236d463e8df8ad96444a559b574045d3fab9334c7e221e33054fce8f229c9ec8d07b31ed82884f8b36b64b42ab44bac70f0ea5c7fb34951a3c1b71324e10473db349cf734a572dfb74cbf8c5bb8f08afe1642e212aed9c96ad085f074c1e6b324d81be3948bf7d69cfba85958978dd2149c2226dbdabbb2139afbae101cf2c07bfb66938362bc17e49d7af1ee418dc8ff95583656988d163f19dc06201f203ec0cd16159ef3e582091542447dc2084ce90dee142c2242886232d05376f4930cce0704896dd02540a13bc70cac26ba8e04e6c8e2e2fe3890a5912536c203b16ec8af55bcd2a5eed316fd9bcaff9c1f3203822732f0a3a12bf0df116844b9ed3c1d61ab45da76b61efcfc1624b19bb72bd0009674663e1c325753210f123c037490eabb72c7daecbe9a42135aa27ff3a18d4dc955e56362f01b7f45a60e7ddad9b355ae4f54a0f3c08dd7b754e0a9b049b628737fd3a9d325f7484d3c44687ee46b1cd668df3bbef696149536d8ad083917d7412e93ff46dc01af39ed45d48dd34b2e9bc0c29112cc857f693ee965c5b72283c842729211cffbee657376e014ed2e0219d76a5fc09997736f215ac347a010b0c0d4ec0fc2630efb6786493bda210379ed3679b50bd6e3875de7af247ddd0657dcd83f8cb7a26e09bd3a5a0509b3dd39ef3e0881ca309bef0d83cdc0f3985c4de71266b8e7ab12d24aded28b6818c2ab957d2f5d2dfbfd87345fc2f173256829424ccfa510893be0388772573667e9a97e48de353e6c7fde2a15317c6147756796e00148216ddc13659346e04de75636ab63338d58eeca05755fe4f69ba22abf85323f0bf2fabdb885dc08856a137f8a8c5c5f5d8238699da103b049c6be8ffe509d4a001fee4a93fc885fa2999541caf61a5717f8f948666363a19180fec4358b1a730ce3b58e3d928e1fedd8a1ecbe7bfde7e572c91bba7ac12b676b130470e42b8644292b691c64e3e341776c782c945460e4e65e5fb654bf1dd70defbd26a0c91035671e71de366d04a1e4f9d86deb603bfba49c3fe9fbac7be7cd0849367045d69697094a78f52da3eeffb465736385054c3af1c15417c8a0dad85125b0c0c19f71e58f2ecddbab5456fe412c6cb2b01cf5e5b2c502ede5ae2de53b4db18c604716c5e3fea514ec19e3ea2af7ca246886f01c376a77dd64306512506a7e689b07d5b949cddb6dba18d232b904d6045fa8f52aeff6d3dd3677bfb03a1316fef29b7b90da8c8badb33fb3bd56a84b71187736bfb9305eee9f07524326e30b20db7db90713798d0c71e17c6b33537285dfbb67cd708d46917338d0378fc9603e4ea6bb0b691169f7bf29aa4cd62fdad9c467443bc03ffe533d90eb7a8e43ba5a2754a6c1e80e98a49a93aaab581e59e6635b2202ed9eda1d1fd3c959077da1af5df34dcba08aa55c728d90d5fb0b", 0x475}], 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5452, 0x0) [ 450.370987][T16572] EXT4-fs (loop3): get root inode failed [ 450.376741][T16572] EXT4-fs (loop3): mount failed 13:44:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc189, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000001980)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f00000003c0)="69f461245fa8f68020", 0x9}]) 13:44:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 450.533590][T16592] loop1: detected capacity change from 0 to 1024 13:44:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, 0xfffffffffffffffd) 13:44:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 450.669979][T16592] loop1: detected capacity change from 0 to 1024 13:44:20 executing program 1: socket$unix(0x1, 0x0, 0x0) clone(0x44000000, 0x0, 0x0, 0x0, 0x0) [ 450.740529][T16609] loop3: detected capacity change from 0 to 524288 [ 450.760981][T16605] loop2: detected capacity change from 0 to 262144 13:44:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x4d0, 0x0, 0x270, 0xffffffff, 0x0, 0x270, 0x5c8, 0x5c8, 0xffffffff, 0x5c8, 0x5c8, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv6=@dev, @port, @icmp_id}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@private, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key, @icmp_id}}}, {{@ipv6={@private1, @loopback, [], [], 'wlan0\x00', 'tunl0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@mcast2, @ipv6=@private0, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@local}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x530) [ 450.823317][T16609] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 450.843307][T16605] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 450.853219][T16605] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xae90, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, "d7e8ba8c115e3c814c8ca39d268cb47d3eb9f94a06bf3f1cfea8bb9ad61c7b25342772ecff3b04c2ed4e6ddccdeff7e12f953a6046c6e6477c1f1011ba7a6210", "b89be3b34f062804003bc3b89e770288c7ab0dee173fd6e0284b4acb86710b4a2d8e76e1600d6e0e0cdb8cf59f90018a4c7e406b1043595361fb9f1d522a2c2f", "99e771bba358adac6752c0c488d705e4928458ebd791e8c179e8b4059eaef652", [0x5, 0x1]}) [ 450.910245][T16609] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:20 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000006c40)=[{{&(0x7f0000000000)=@caif, 0x80, &(0x7f00000003c0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000006e80)) [ 451.017566][T16609] EXT4-fs (loop3): get root inode failed [ 451.090511][T16609] EXT4-fs (loop3): mount failed 13:44:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 451.144484][T16627] IPVS: ftp: loaded support on port[0] = 21 13:44:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp, @nl=@unspec, @l2tp={0x2, 0x0, @remote}}) 13:44:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000c00)) [ 451.368355][T16647] loop2: detected capacity change from 0 to 262144 13:44:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 451.415690][T16647] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 451.446154][T16647] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x10, 0x0) [ 451.539156][T16669] loop3: detected capacity change from 0 to 524288 13:44:21 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/psched\x00') 13:44:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000290000003700c1"], 0x18}}], 0x1, 0x0) 13:44:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) [ 451.650946][T16669] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 13:44:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 451.727340][T16669] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$LOOP_SET_FD(r0, 0x4020940d, 0xffffffffffffffff) [ 451.809913][T16669] EXT4-fs (loop3): get root inode failed [ 451.861154][T16669] EXT4-fs (loop3): mount failed 13:44:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:21 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2a201) [ 451.993316][T16692] loop2: detected capacity change from 0 to 262144 13:44:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:21 executing program 0: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000fe8000/0x1000)=nil) sched_rr_get_interval(0x0, &(0x7f0000000000)) [ 452.082332][T16692] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 452.092751][T16692] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8946, &(0x7f00000000c0)={'sit0\x00', 0x0}) 13:44:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}}) 13:44:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002e00)=[{{&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, &(0x7f00000021c0)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x14, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0xc6}]}}}], 0x48}}], 0x1, 0x0) 13:44:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x182c, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) [ 452.474334][T16709] loop3: detected capacity change from 0 to 524288 13:44:22 executing program 5: syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x0, &(0x7f0000000000), 0x0, 0x4) pipe(&(0x7f0000000040)) [ 452.591379][T16709] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 452.629372][T16709] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 13:44:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0xc8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x2b0, 0xffffffff, 0xffffffff, 0x2b0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@empty, @private0, [], [], 'ip6tnl0\x00', 'dummy0\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x180, 0x1e8, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, @private0, @empty, @empty}}, @common=@dst={{0x48, 'dst\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) [ 452.654407][T16709] EXT4-fs (loop3): get root inode failed [ 452.664612][T16709] EXT4-fs (loop3): mount failed [ 452.692060][T16721] loop2: detected capacity change from 0 to 262144 13:44:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 452.853475][T16721] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 452.872875][T16721] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 452.931226][T16737] x_tables: duplicate underflow at hook 3 13:44:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8994, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008858) 13:44:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00080080ff"]}) 13:44:22 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) [ 453.119594][T16744] loop3: detected capacity change from 0 to 524288 [ 453.150879][T16744] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 453.179946][T16745] loop2: detected capacity change from 0 to 262144 [ 453.207734][T16744] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8913, &(0x7f0000000840)={'ip6tnl0\x00', 0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x2, 0x8, 0x100, 0x0, @remote, @local, 0x8000, 0x8000, 0x400, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'sit0\x00', r2, 0x2f, 0xd7, 0x0, 0xffff029f, 0xa, @dev={0xfe, 0x80, [], 0x3b}, @private2={0xfc, 0x2, [], 0x1}, 0x8000, 0x1, 0xffff7294, 0x2}}) [ 453.227887][T16745] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8918, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 453.271892][T16744] EXT4-fs (loop3): get root inode failed [ 453.277902][T16745] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 453.288165][T16744] EXT4-fs (loop3): mount failed 13:44:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0xc0045878, 0x0) 13:44:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000040)="fa14") 13:44:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x8000000) 13:44:23 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000200)={0xa}, 0x6) 13:44:23 executing program 4: pipe(&(0x7f0000000040)) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) [ 453.653814][T16776] loop3: detected capacity change from 0 to 524288 13:44:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in6=@mcast2}}, 0xe8) 13:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, 0x0, 0x0) [ 453.749263][T16776] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 453.775790][T16780] loop2: detected capacity change from 0 to 262144 13:44:23 executing program 5: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x4000031, 0xffffffffffffffff, 0x8000000) [ 453.818985][T16780] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 453.837342][T16776] EXT4-fs error (device loop3): ext4_fill_super:4954: inode #2: comm syz-executor.3: iget: root inode unallocated 13:44:23 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x77359400}, 0x0) [ 453.869851][T16780] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:23 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 13:44:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00'}) [ 453.912197][T16776] EXT4-fs (loop3): get root inode failed [ 453.948519][T16776] EXT4-fs (loop3): mount failed 13:44:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:23 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x2000001, 0x13, r0, 0x8000000) 13:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x40, 0x0, 0x0) 13:44:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 454.269628][T16810] loop2: detected capacity change from 0 to 262144 [ 454.363070][T16810] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 454.375179][T16820] loop3: detected capacity change from 0 to 524288 [ 454.379985][T16810] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 454.413513][T16820] EXT4-fs (loop3): unsupported descriptor size 0 13:44:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='clear_refs\x00') write$P9_RXATTRCREATE(r0, 0x0, 0x0) 13:44:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:24 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000004f80)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000004ec0)=[{&(0x7f0000000040)={0x14, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x4}]}, 0x14}, {&(0x7f0000000300)={0x3b0, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xa5, 0x0, 0x0, 0x1, [@generic="6b65bbfa42549b1cec9ff0b0f946af2ea0f451a9f67c50496fa62fe5ff7700d4b17e9cacec55b240368535633fde616aef574557da72201a6fd24380b2cdcde315f59316b9fc39697f5388342ef6483134d092712301584d0e225dea71d645b1db84a33c2af75d555d4de8d874fc7fcb6726a60bc5375fc5f128f5265284b6c7d056db71d2ea7c10c966feff5e286f87e456563caaef50a7e45bffdd9975b3f444"]}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={[], [], @loopback}}, @generic="f88abc6967b0bdd619e49a28d5c5a5be8bdd3f0354c7b2666ec48a871bbe7cf056141f7637cc5f46df0db7e199fbbb2e5cd9213fb9f8ac8a88f85596421a7bf591803c932612cc0952b447984e090dffcd052f46b20c775620fbcdeb5f4f41e03be3d3e31df63efe272f1e442fa01902c6c6e9e32302db3a42395dc05740bb49606e911ea4d1ba213818fdb5612d0976528933919d08fff480e3514b75a3ce391b9a81b1eb1db6fe081f3ad704e27ec4460e13743e2c2bffd503d131fe28bbdf93307c07da9614027c", @typed={0xb, 0x0, 0x0, 0x0, @str='(\xb6:\xbe\':\x00'}, @nested={0x201, 0x0, 0x0, 0x1, [@generic="81f5d94b13956e2a38379637b4826912d622e223fa7002506a97b1cd2e78cace66b7a005d41571d49ef1f2ccdba502919adb46fe90d9e5167a68c4eb42e95306dcf8541eb26d8913a1bf8184af4b506bfa5dcff95600a615bc", @typed={0x31, 0x0, 0x0, 0x0, @binary="e4cf80a498abfb778049d3e6dace4c081a56d62bc994b1a6fc38969dfa5b396c09231ea0706b0989b0ad875241"}, @generic="b290f0398cf6a82bbbb27b2ec26097af898261fec6a892d995f71291cb7ef2292065dcf92cee3bf9b44484da29d2bea90dd2950756c99969dfadcbb262c857d4cf4ac44d048bd28b159aaffa73915315273232ec9526930cfe27b8855684d6e762684610b382d356ec55d94c72d8817b560b6a35d0d51711feb2592d6926d5c697dc5748f6bec8c32877589d7a2efa2da114c6ba62e004265b269237fb0c5741897aceb4fb31a3562bcef484e9ddd046ff225a989d10d6", @generic="10aab2a6b00cb31df3001da817d29ce3a719ae2cb5710e463da8879c5290ad24fefb71f3898d0c81d8ae503f32af41ab655567c797472d3fe80ae9725c7f75aab13dd367c4517b7992aac2825c38104b97d327798bac4832cc845f9fc3b27d70fa137dcb6d967d8eb2a8b0d320e8f990c4fdf11bbfd2650339bf16222c3921e463c809caecc06fd3bb792a59a4d4ac190b8c0aa384a0353edce2f1d646f4c32d98645ba19aca67b066c38a9e26888de17803faf9530f03fce9"]}]}, 0x3b0}, {&(0x7f00000006c0)={0x358, 0x0, 0x0, 0x0, 0x0, "", [@generic="8cd2ca3f87b87c2ef504e2f594ca9d0081ccbb51356c5532b9651b65905286070534", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x7, 0x0, 0x0, 0x0, @str=')&\x00'}, @nested={0x219, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}, @generic="5453d0cd8b88a9f52f4dde11b0f12a2af43d793877c9c964aa5d7a6511fcfe41f613ed5695df45eed4ce8f482d8852b8181a330316510d27f74c4b112f288a2a28faa607c3c8dccd1847f2ea9cf9b5dfbc4fb9ca337d1ecfd12ce88d30dbdc4429d7e1f616e8fe6b9cc15a3630257768d9990102a63f5c5ac5f350244cc8af2c6c1c77bb7fa0734481ec237375e0f616e636caee15e3e5b9830ffd6318576b75a80e67e1c5b2b5e6538366b1ff1e145eeaf517", @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="cbe209bac3d908a1c784aca00508da5b200b7e8569dee051ebd60adca4d64df4690a4d436e4a15e767c69b924a664b4ae3664d1c81d084de1e33cf7a764d2579c6deda8525df682451a24eb249e5f8a9fc9b800c93d2ff93de330a89c83bca3bb6f188747b0a5b6a2d8204fc1cea0ee6893a3df9f31b893f9d8e6a31da556aabe128144c7e1b81da589307d7da69", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="4eb8717a7bbb547f652294c5722a44bef94be179f482f17139846f566adb8453103e5970834dfd6e570a4a1016407cc279bad2266d563be858581758d7fd5459c790e5464d397a21562f0666565540dbc79487744757c24e2050c47c6fa1deaec3cc508f4d1a5e7a60c6755b20b87df944cd1d3affa20ea4fd1c287a82a9907ca6abc7711a8fd18b30300d28300ac84a65945b24730e434a1195748cb333072d2e88174e8625f8b872f09016e2bcc145"]}, @typed={0x4}, @generic="83c51c4620b872e32c36c0eb223919ab38a864e4116cc533ea3bebe94922e6a8d1e69b374cb22e679e3d65d1c1c55eb3bd6e0dacd667ab8cfa66f2734f010278abae797732b23b6001bb1157709c089c308072cc005f25b7a82968e96c5df3e0cdc93fba84eb519d39b56196231c433a5c062fd8175347993b5a5624f48bf329529f3414acb79738a9356565a012c35c9e71ebdb7311af607753a6b61dea9c6d1a7257a307a19448ba02266954535d03932441e7fac00429e31e1e1c04e1ef7c91fef1226e1dc41cc57b3fbd2d0a3f8749254ce90f8cbc8c2db7d5fed371073e8afa6545a8729310ca135acaa5dfc5a424dc84"]}, 0x358}, {&(0x7f0000000080)={0x198, 0x0, 0x0, 0x0, 0x0, "", [@generic="03d7b616247b40960db53e8ea8e0d2c959ac546c88be307036b2d89fee5254f45032f723cc4bda52462192b7b4a5b938bd3c6f15eea3d156b8043501513c4b7985d130a102c578b23c9a52742397d57e2f838ad0cc0585025a3ffbb4a2d6c1abe64959ae61e138dc95d08b38b63b24a6283c09fee8c922b80d7996895ae1efbc0d39a7e3504dc0ebf7edd6df1bce18db039380a1e53bf31f719f8830116c8edf53f7c7fa717c189bca4080dad8a15b72eb2f8cf8100181ec5dd8f04272382b65ea57087b461a18758d0c24047a44b9a99f55525065", @typed={0xad, 0x0, 0x0, 0x0, @binary="4a2ac1171471bf8de0ab5af3fa231f85a2facedb2055aa18225983dc60f21c86b5a2e645f72eecb556c0c2ec5b3fa80633e5de472f448bfca2116202b7231ddaef20e120bbc55d9ebeca2726144b0d6640c30d05880d2097949986d7cf96cb690f362cff326d557c697e1bf945c01096ccf1e913e6f2af7328bd8c8dcfd07de31394f695fff0c1ed43881e9b4aa8a8471e950cddc87f76416792519669f892b3d41271aa75c489ab80"}]}, 0x198}, {&(0x7f0000000a40)={0x10b4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x10a4, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x7d, 0x0, 0x0, 0x0, @binary="369b8bcb99fe03c0127ec44edbf2ac37c7d7e22a947ac863ffc659510eab69460f89e33ce44e51cb5560ce73e5f734ffb7f78d48606d9cbad2050374c834273a7359f2f10da824bfaa61bda92b7383ca0174a465f4f042719bd35cfb60fb75826940411d82209793743085d9b86864a9edca392792d9fb2ae6"}, @typed={0x1001, 0x0, 0x0, 0x0, @binary="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"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}]}]}, 0x10b4}, {&(0x7f0000001b00)={0x2d0, 0x0, 0x0, 0x0, 0x0, "", [@generic="b44066f10232f11843b6fce62b6a9b6fc0765a6daf44bf91a3ab6c1ee3a576d4fe9980db3e364624871c1b27b2225ad14e8b35a14352324284e167626768cb6afcc9f09a0b070228efb486e9c2d9f1d0a6ed82cbaa6a2f457468f29c4066abb367c866e7913735e103793e11551f6b19406e4838277b1996ae922f874c1ac9e7ed0323e71c199c5594e966d2cbd7d436f5635821710c79ca5274adff47603af86f7ea15e286f", @nested={0x111, 0x0, 0x0, 0x1, [@generic="144b217b3d1e805fcdbb03d102a8951a879c27be4439f6f8d3054514e9fbdbdd453fef94", @generic="4eedc3b612f3c94e83ee7d02bdf9ff565e20c4fe6a710db409625c3f2a9559f58414f628615ca8f00bca4ecfc1716c586ecb7d00e2f07f2bc22dd095f9e03ef1fd083c097264026204686884d3484fdcb8cc1bfa53e46f6070fd280511814423ab64e2773b6f84f98c3f9480b5e4d4ca08749726192822244fa68a025bbc659cc7a1eff6", @generic="a10e8169303e31a6057bdc1b8338053090af0fc578b65508ed4dff2aa5b3f276c16367c6ced3b61c637937a24ff22bec808310cd189fc5b005442eb25e4bf4094a8742a2eae7f032d6ce3207d89573bd51ec7f0ff28b329488afd7cc86a88131adeaf2115d"]}, @generic="913cf7f31b41f8d072c9f20beb87acc7a8e0220b7891ae7d36a912e59fc9f58bcae9d2e8ff44d9403df50824714ab2c8d6f53d0c72e9baac57fc74681319cb58fe9a0189601c7afc8c846d2b4900fd", @nested={0xb1, 0x0, 0x0, 0x1, [@generic="13fc5d3f090a31af38fc87d0b37daadfdee9327722f4db3b2cfd6d64e598486cc715e6fbba635357f0bf2215ac735fe38bf4fb3f57a918cc14cfd764b6988d354dd5a852c4871b615bd3251768ef1975fdc34ab0e7fbff29afda2f2a30ea04affc7a90096827ddc70ec3c54c9909092105f8a145e19a09b7be96e84974abd81fa2ed9fb9ca1774383dc4af370a0d4c551635a73ec0cf483f4026251a5266a029c1", @typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}]}]}, 0x2d0}, {&(0x7f0000005040)={0x28c, 0x0, 0x0, 0x0, 0x0, "", [@generic="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"]}, 0x28c}], 0x7}, 0x0) [ 454.677536][T16833] loop3: detected capacity change from 0 to 524288 [ 454.789537][T16833] EXT4-fs (loop3): unsupported descriptor size 0 13:44:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000280)="738757d5480a13eb9522ef1d22851cf6763bd41c66524ea3afc8992931c3366f78d3aac34a45eb2c791fcecb3e7ea185b303a897b4fcfec54aa006f2cc4ab1c2cb348ed6020644506fb9aa0047b7cb95758275cd06c88f402c7ba991a5f79a31fa39fced100f0ded8ffde4a2ca9f8f32cf864bea7acbb39f4bbfeea7eeab4ed8e64c69356d799136f98f44dbb646634c67d66d7e8cb1fd90402740db75b078cfdb92db195162eece10bcf00685f9ab6fa77cdbda52e13f446113bf582c3abfc257fb64df89aa1406f8e79507429fe452758159203d047d129cf8189aa0e8724823895b6219efb79909f5d9b24500", 0xee}, {&(0x7f0000000100)="62d71d988f161f8c19a07def3c5cb1951c9ea0", 0x13}, {&(0x7f0000000380)="6a2269d86f6702b22205683190dfbd3c0f969cdf8bdb666e029fb63d57237894cfbc43175c16b981a38f2767ca2ac50c8910235279708b53d9366b769a8ff5ee2c19aaf238eb076f7ebd21a73684f5700eb2bfc562a28a8864481e99d81af91459938b1c77538247ab31280f9d8444bcf5bfa3cdc45c585b72e76b4884ee0a94394c5d8b070eff3c0f2d8f3b89c7e8cc3976e724d9dc6ce86c983b20ea370f0c8d3a1f9f8a5e9c5cd1b108bbd69bb97e88b9b1b38fb6e25f59582c33d5814569a53279a4439a14231827b9ce774633de9286b0c264d551569440d3d9551be78a06ca2bfb7e0a1a7920955692802da2c2dc2878860890561c3a09405b24eb5ff622a41b7a68b279cc12323c90ac2848dba693532d0fdfe0d55de64fae1dbc59dc0adad41b80108f6a179a53b33b1d6e199ac1898dc91ee1ee0f7a922dab1b997fb68957da1e0ee60ec9a73c3405dabc7097bdbfa18d69e6416b6cce31b52313f355b17d5f55957111d34fc3ea4d7765b8020181376b4f39ceb1e09fa1a1d47dd401d076ea3010c42ec8f0731c45142e31d415c10e03d6ea9217287ff12a58d8a4bd40fce1d04983e9c346ea1d602f9822cbe566595f4cb597c0b13ab3cfdd93a11490fb5097e22c63b8799530b1e81d3d823fd262168bbe9e7e7a40a886104f28b844ccb028f5e8b32db1d963f075a8012b83ba68582fa03718c1a96af2402aa16f8293abcf7f9d6164c149107a888479f2e392cb50f6cb1614f85223cb212777b7ce254022dfa856cd8f997bfecc25144eaa34ef96cf61494ed6c39f0d084af9bd96a52b715e0115e6608a93f87f4e2077acd613ddaf4cfce30605c2cd18e7269301962e098f1c0846d49e5e1172602389f290083abb0374b0898c1b0ec60b35754619dd4e24d1dd5ed84769cb66e007e42522f05abc649d6533660dac3a035a4b7e07f9fa0b45685039cfb6761fc9e7577c055e845ad1e831e2e0c3375a44f2b55702deace19461c9e8c1d83714998861b75dbfadf03d9f4b23c1191fbb7c578adfcad97116c7cdcc0db5ca6f6edc889fa069a58d95dd544c69d2c49aff81353b4b2245c6f48c71e8207c8005acbeb35b20352361b1def6b990f51f91c0f129ab6c87d5656419e33dcdc7c969fe00b9fe6890891574353c96a168ef97e6572bde7aa6b2fab14982dea56943ccb0cb2621351cadbcc87a3b1e27bcaf7f577670c492273ec6577b5f2e1f96b2eb15f38ebae62fa50eea6579ee9582bb1b6a4f6bfd5e0d1019ca251a0f043dc8387cdfa6f7fed4e2fc2f12e157f006f38464e597913c0041fe41ca2d45a1676ce869ab9a180a209463e04cb0d41e6a84da8a131e98d4dc5bf3f56ba437f5cd2d3b9d1247f3378f6d2de6af4541688a62acb5e99a59d8a18ed0711f068fbe40072e4ded516c4beecdaf5ba8dff54bffe02348139ac89b8239ee117ea19b368632f333214d1ba1a482917c8c4c2223d34c5d984dd3435671cc058e15966f4fc1a607affe73687ece9e612402985e7e754ed9b927b9fdca19b97ffe2763ee6f0458643fe883ae99e3fee29ae96143880f5b83f7523aa8b5e0ec2c5929dffd6738373703d16953565e7734926e9058814362d3128dab5cdf265285b640320887118188407e9e15314da4e07a1374f1d2a34ad183759d3d9d2a4540fe45f942e284fe", 0x4ac}], 0x3}, 0x0) 13:44:24 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x43}}], 0x18}}], 0x1, 0x0) 13:44:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f5, &(0x7f00000000c0)={'sit0\x00', 0x0}) 13:44:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast1}}) 13:44:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 455.021418][T16849] loop3: detected capacity change from 0 to 524288 13:44:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000640)={&(0x7f0000000500), 0xc, &(0x7f0000000600)={0x0}}, 0x20040013) 13:44:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8918, 0x0) 13:44:24 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40, 0x0) [ 455.100614][T16849] EXT4-fs (loop3): unsupported descriptor size 0 [ 455.110599][T16850] loop2: detected capacity change from 0 to 262144 [ 455.163053][T16850] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 455.175095][T16850] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 455.280472][T16868] loop3: detected capacity change from 0 to 524288 [ 455.293764][T16868] EXT4-fs (loop3): unsupported descriptor size 0 13:44:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000000)={'veth0_macvtap\x00', @ifru_ivalue}) 13:44:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000540)={0x2, &(0x7f00000004c0)=[{0x2}, {0x6}]}) 13:44:24 executing program 4: sched_setscheduler(0x0, 0x3, &(0x7f0000000380)) 13:44:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:25 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f00000027c0)='nl80211\x00') 13:44:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8943, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:25 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0xf, 0x3f2, 0x0, 0x0, 0x0, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) [ 455.625304][ T35] audit: type=1326 audit(1607262265.103:54): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16880 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 455.654063][T16887] loop3: detected capacity change from 0 to 524288 [ 455.696862][T16887] EXT4-fs (loop3): unsupported descriptor size 0 13:44:25 executing program 0: syz_read_part_table(0x2, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0), 0x0, 0x100000000}]) 13:44:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x3e}}], 0x18}}], 0x1, 0x0) [ 455.770866][T16892] loop2: detected capacity change from 0 to 262144 [ 455.805192][T16892] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 455.820797][T16892] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:25 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x171041) [ 456.006984][T16905] loop0: detected capacity change from 0 to 135266304 [ 456.072023][T16909] loop3: detected capacity change from 0 to 524288 13:44:25 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)={0x1, 0x0, @d='abcdefghijklmnop'}, 0x18, 0xfffffffffffffffd) [ 456.142812][T16909] EXT4-fs (loop3): unsupported descriptor size 0 [ 456.379217][ T35] audit: type=1326 audit(1607262265.853:55): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=16880 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000100)="95", 0x1}], 0x1}}], 0x1, 0x40) 13:44:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8901, 0xfffffffffffffffd) 13:44:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x10042) 13:44:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5411, &(0x7f00000000c0)={'sit0\x00', 0x0}) 13:44:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89b0, &(0x7f0000000a00)={'tunl0\x00', &(0x7f0000000940)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) [ 456.544770][T16933] loop3: detected capacity change from 0 to 524288 [ 456.583203][T16933] EXT4-fs (loop3): unsupported descriptor size 0 13:44:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc189, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000001980)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f00000003c0)="69f461245fa8", 0x6}]) 13:44:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000001d00)={@mcast2}) [ 456.595417][T16930] loop2: detected capacity change from 0 to 262144 13:44:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xb1, &(0x7f0000000180)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 456.667009][T16930] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 456.678876][T16930] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x60}]}) 13:44:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000070c0)) 13:44:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc189, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000001980)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000003c0)='i', 0x1}]) 13:44:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4b49, 0xffffffffffffffff) [ 456.986678][T16958] loop3: detected capacity change from 0 to 524288 [ 457.022640][T16958] EXT4-fs (loop3): unsupported descriptor size 0 13:44:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000002200)={'gre0\x00', &(0x7f00000020c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}) 13:44:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000100)="62d71d988f161f8c19a07def3c5cb1951c9ea0", 0x13}, {0x0}, {&(0x7f0000000380)="6a2269d86f6702b22205683190dfbd3c0f969cdf8bdb666e029fb63d57237894cfbc43175c16b981a38f2767ca2ac50c8910235279708b53d9366b769a8ff5ee2c19aaf238eb076f7ebd21a73684f5700eb2bfc562a28a8864481e99d81af91459938b1c77538247ab31280f9d8444bcf5bfa3cdc45c585b72e76b4884ee0a94394c5d8b070eff3c0f2d8f3b89c7e8cc3976e724d9dc6ce86c983b20ea370f0c8d3a1f9f8a5e9c5cd1b108bbd69bb97e88b9b1b38fb6e25f59582c33d5814569a53279a4439a14231827b9ce774633de9286b0c264d551569440d3d9551be78a06ca2bfb7e0a1a7920955692802da2c2dc2878860890561c3a09405b24eb5ff622a41b7a68b279cc12323c90ac2848dba693532d0fdfe0d55de64fae1dbc59dc0adad41b80108f6a179a53b33b1d6e199ac1898dc91ee1ee0f7a922dab1b997fb68957da1e0ee60ec9a73c3405dabc7097bdbfa18d69e6416b6cce31b52313f355b17d5f55957111d34fc3ea4d7765b8020181376b4f39ceb1e09fa1a1d47dd401d076ea3010c42ec8f0731c45142e31d415c10e03d6ea9217287ff12a58d8a4bd40fce1d04983e9c346ea1d602f9822cbe566595f4cb597c0b13ab3cfdd93a11490fb5097e22c63b8799530b1e81d3d823fd262168bbe9e7e7a40a886104f28b844ccb028f5e8b32db1d963f075a8012b83ba68582fa03718c1a96af2402aa16f8293abcf7f9d6164c149107a888479f2e392cb50f6cb1614f85223cb212777b7ce254022dfa856cd8f997bfecc25144eaa34ef96cf61494ed6c39f0d084af9bd96a52b715e0115e6608a93f87f4e2077acd613ddaf4cfce30605c2cd18e7269301962e098f1c0846d49e5e1172602389f290083abb0374b0898c1b0ec60b35754619dd4e24d1dd5ed84769cb66e007e42522f05abc649d6533660dac3a035a4b7e07f9fa0b45685039cfb6761fc9e7577c055e845ad1e831e2e0c3375a44f2b55702deace19461c9e8c1d83714998861b75dbfadf03d9f4b23c1191fbb7c578adfcad97116c7cdcc0db5ca6f6edc889fa069a58d95dd544c69d2c49aff81353b4b2245c6f48c71e8207c8005acbeb35b20352361b1def6b990f51f91c0f129ab6c87d5656419e33dcdc7c969fe00b9fe6890891574353c96a168ef97e6572bde7aa6b2fab14982dea56943ccb0cb2621351cadbcc87a3b1e27bcaf7f577670c492273ec6577b5f2e1f96b2eb15f38ebae62fa50eea6579ee9582bb1b6a4f6bfd5e0d1019ca251a0f043dc8387cdfa6f7fed4e2fc2f12e157f006f38464e597913c0041fe41ca2d45a1676ce869ab9a180a209463e04cb0d41e6a84da8a131e98d4dc5bf3f56ba437f5cd2d3b9d1247f3378f6d2de6af4541688a62acb5e99a59d8a18ed0711f068fbe40072e4ded516c4beecdaf5ba8dff54bffe02348139ac89b8239ee117ea19b368632f333214d1ba1a482917c8c4c2223d34c5d984dd3435671cc058e15966f4fc1a607affe73687ece9e612402985e7e754ed9b927b9fdca19b97ffe2763ee6f0458643fe883ae99e3fee29ae96143880f5b83f7523aa8b5e0ec2c5929dffd6738373703d16953565e7734926e9058814362d3128dab5cdf265285b640320887118188407e9e15314da4e07a1374f1d2a34ad183759d3d9d2a4540fe45f942e284fe73d2855d446750ddf04b3dae344b643484cf8f3e9cae392a247fe99284727d7cf73bad9c1028dc1716f76a1c2ec410dbf446d2888d0d15dd92ffc40e1e89d255c88cbdcebf7cc8fc4a350f843af6cbed4231a838d07345e8d8f4c3f918c50275ffec2f6a17cefa0694c0f9b0847cfabe8d3825d7a41e80516325dd5635e3fb0b61f721af8aa0161ebd432d60ba3168e0628406885332573fb428f2cea61449e5bdb642c75a6670a64e5d5273cdc0339f57e57523ced1dea9f36e0cd182c009140742aaad5bded8429d0b50e370f286caf7282c7dd5db2cc3dc4e75ab5d204aac61d4cb8b13ed693cc6bbf2d6d371", 0x59a}], 0x3}, 0x0) [ 457.139106][T16965] loop2: detected capacity change from 0 to 262144 13:44:26 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) munlockall() r0 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r0, &(0x7f0000002e00)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002e00)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020}, 0x2020) syz_open_procfs(0x0, 0x0) 13:44:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 457.208862][T16965] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 457.272105][T16965] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 457.341149][T16979] IPVS: ftp: loaded support on port[0] = 21 13:44:26 executing program 5: clone(0x40029080, 0x0, 0x0, 0x0, 0x0) 13:44:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(0xffffffffffffffff, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:27 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@cgroup, 0xffffffffffffffff, 0x3}, 0x10) [ 457.496537][T16984] loop3: detected capacity change from 0 to 524288 13:44:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8927, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 457.617165][T16984] EXT4-fs (loop3): unsupported descriptor size 0 [ 457.630170][T17007] IPVS: ftp: loaded support on port[0] = 21 [ 457.645183][T16979] IPVS: ftp: loaded support on port[0] = 21 13:44:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:27 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x2200) [ 457.866102][T17046] loop2: detected capacity change from 0 to 262144 [ 457.936241][T17007] IPVS: ftp: loaded support on port[0] = 21 [ 457.957426][T17046] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 457.966665][T17060] loop3: detected capacity change from 0 to 524288 [ 458.009927][T17046] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 458.049312][T17060] EXT4-fs (loop3): unsupported descriptor size 0 13:44:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10}, 0x40) 13:44:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 458.302249][T17106] loop3: detected capacity change from 0 to 524288 [ 458.316736][T17106] EXT4-fs (loop3): unsupported descriptor size 0 13:44:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000100)="9d", 0x1}], 0x1}}], 0x1, 0x0) 13:44:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, 0x0, 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 463.300544][T17142] loop2: detected capacity change from 0 to 262144 [ 463.342626][T17142] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 463.356826][T17142] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 463.379965][T17148] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:44:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:33 executing program 4: io_setup(0xc189, &(0x7f0000000380)) io_submit(0x0, 0x0, 0x0) 13:44:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001140)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000580)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000800)=[@ip_retopts={{0x10}}, @ip_ttl={{0x14}}], 0x28}}], 0x2, 0x0) 13:44:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000002580)=ANY=[], 0x239c}}, 0x0) 13:44:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, 0x0, 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8912, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 463.844261][T17160] loop3: detected capacity change from 0 to 524288 [ 463.881954][T17159] loop2: detected capacity change from 0 to 262144 [ 463.891322][T17160] EXT4-fs (loop3): unsupported descriptor size 0 [ 463.912965][T17159] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 463.934510][T17159] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x24}}], 0x18}}], 0x1, 0x0) 13:44:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18"], 0x18}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x2, 0x0, 0x0, [@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}], 0x38}}], 0x2, 0x0) 13:44:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 13:44:33 executing program 4: memfd_create(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x16000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) 13:44:33 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r0, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:44:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001140)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000580)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000800)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}], 0x18}}], 0x2, 0x0) [ 464.327860][T17182] loop3: detected capacity change from 0 to 524288 13:44:33 executing program 0: io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 13:44:33 executing program 5: pipe(&(0x7f0000000040)) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000200)=""/2) 13:44:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, 0x0, 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x3}}], 0x18}}], 0x1, 0x0) 13:44:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast1}, 0x2, @in6=@mcast2}}, 0xe8) 13:44:34 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x4000) [ 464.444238][T17182] EXT4-fs (loop3): unsupported descriptor size 0 [ 464.719913][T17200] loop2: detected capacity change from 0 to 262144 [ 464.767836][T17200] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 464.768659][T17200] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x80000000, 0x3, 0x6}, 0x40) 13:44:34 executing program 0: pipe(&(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 464.914080][T17210] loop3: detected capacity change from 0 to 524288 [ 464.973552][T17210] EXT4-fs (loop3): unsupported descriptor size 0 13:44:34 executing program 4: memfd_create(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x16000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) 13:44:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40000) syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'erspan0\x00'}}, {@fsmagic={'fsmagic'}}]}}) 13:44:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') read$FUSE(r0, 0x0, 0x0) 13:44:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{}, {0x5}, {}, {}, {}, {}, {}]}) [ 465.329747][T17228] IPVS: ftp: loaded support on port[0] = 21 [ 465.354843][T17227] loop2: detected capacity change from 0 to 262144 [ 465.393869][T17227] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 465.412582][T17232] loop3: detected capacity change from 0 to 524288 [ 465.422790][T17227] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:34 executing program 4: memfd_create(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x16000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) [ 465.476267][T17232] EXT4-fs (loop3): unsupported descriptor size 0 13:44:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$FUSE_GETXATTR(r0, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 13:44:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5421, &(0x7f0000000a00)={'tunl0\x00', 0x0}) write$P9_RATTACH(r0, 0x0, 0x0) 13:44:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18"], 0x18}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 13:44:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:35 executing program 4: memfd_create(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x16000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) [ 465.868001][T17272] loop3: detected capacity change from 0 to 524288 13:44:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5451, 0x0) [ 465.982977][T17272] EXT4-fs (loop3): unsupported descriptor size 0 13:44:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) bind(r0, 0x0, 0x0) 13:44:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8930, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 466.126680][T17283] loop2: detected capacity change from 0 to 262144 13:44:35 executing program 1: clone(0x51820000, 0x0, 0x0, 0x0, 0x0) 13:44:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000100)={0x2, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private0}}]}, 0x38}}, 0x0) 13:44:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 466.177813][T17283] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 466.200377][T17283] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 466.288481][T17293] loop3: detected capacity change from 0 to 524288 [ 466.327951][T17293] EXT4-fs (loop3): unsupported descriptor size 0 13:44:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xeb0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffff}, @ETHTOOL_A_BITSET_VALUE={0x77, 0x4, "546802d6a2ec859fad17c4136a4d4bfd1dd0d38e4cc6f6f3fa4b5678da711b5dab783bc0c9e2f77375f2d417a19e9aaba13bf61d5542c278901a7d0825a4c1f65c78f7db800084d5964f5b08dd3023864a18dfdb9ace0cbfce16fd531eeedeef435a9e99eff991765f50bccb6aa19a6ddf50cc"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xe25, 0x5, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x50}, 0x480c0) 13:44:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 466.457154][T17300] IPVS: ftp: loaded support on port[0] = 21 13:44:36 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 13:44:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f00000024c0)={0x0, 0x239c}}, 0x0) [ 466.616835][T17316] loop3: detected capacity change from 0 to 524288 13:44:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @dev}}}}) [ 466.666899][T17314] loop2: detected capacity change from 0 to 262144 [ 466.692431][T17316] EXT4-fs (loop3): unsupported descriptor size 0 13:44:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x891e, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 466.768602][T17300] IPVS: ftp: loaded support on port[0] = 21 [ 466.777795][T17314] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 13:44:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 466.822565][T17314] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 467.074341][T17368] loop3: detected capacity change from 0 to 524288 [ 467.114628][T17368] EXT4-fs (loop3): unsupported descriptor size 0 13:44:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89b1, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001140)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000580)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000800)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_addr={0x44, 0x4}]}}}], 0x18}}], 0x2, 0x0) 13:44:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004c80)=[{{&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000200)="80", 0x1}], 0x1}}], 0x1, 0x0) 13:44:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000040), 0x8) 13:44:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8911, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 467.299004][T17385] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 467.318151][T17381] loop2: detected capacity change from 0 to 262144 13:44:36 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 467.438631][T17381] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:37 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc189, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000001980)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x0, r0, 0x0}]) 13:44:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8971, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 467.543585][T17381] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 467.576518][T17397] loop3: detected capacity change from 0 to 524288 13:44:37 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000003980)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x0) 13:44:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 467.652056][T17397] EXT4-fs (loop3): unsupported descriptor size 0 13:44:37 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000006c0)={0x2020}, 0x2020) 13:44:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8903, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x2, 0xff}, 0x20) [ 467.966493][T17419] loop2: detected capacity change from 0 to 262144 13:44:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) 13:44:37 executing program 4: clone(0x1c004400, 0x0, 0x0, 0x0, 0x0) [ 468.051073][T17424] loop3: detected capacity change from 0 to 524288 [ 468.069588][T17419] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 468.114411][T17419] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f00000001c0)=@raw=[@map_val], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x10000000) [ 468.216763][T17424] EXT4-fs (loop3): unsupported descriptor size 0 13:44:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:37 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000cd80)={0x0, 0x3938700}) 13:44:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8970, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) 13:44:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)={0x14, 0x25, 0x1, 0x0, 0x0, "", [@generic="bd"]}, 0x14}], 0x1}, 0x0) 13:44:38 executing program 5: clock_gettime(0x7, &(0x7f0000000340)) [ 468.598668][T17448] loop2: detected capacity change from 0 to 262144 13:44:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000280)={'ip6tnl0\x00', 0x0}) 13:44:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000a00)=[{0x0}, {0x0}, {&(0x7f0000000f00)="f6", 0x33fe0}], 0x3}}], 0x1, 0x0) [ 468.660783][T17448] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 468.670857][T17455] loop3: detected capacity change from 0 to 524288 [ 468.696927][T17448] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 468.753730][T17455] EXT4-fs (loop3): unsupported descriptor size 0 13:44:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:38 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x44000000, &(0x7f0000000280)="91f8ff66a62d8a325a3de479a13631d239ad3f2bd63ccd6852650b86a03bf498b223f821806ff0991e173fca9e2707eb60545fe831c3c4436e9d8fe2a962ac3a69a880fe3fbb3310ec0d5f2bbc1214522ed942e8f7e9ca8918353a9b888a12e6d1d7edf1bd2927d6cbf1185e141d37c538476ebabd074addc9f9a20fc18dd149ba", &(0x7f0000000380), &(0x7f00000003c0), 0x0) 13:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x2, 0x4) 13:44:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @multicast2, @local}}}}) 13:44:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) 13:44:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 469.268463][T17478] loop3: detected capacity change from 0 to 524288 [ 469.291213][T17482] IPVS: ftp: loaded support on port[0] = 21 13:44:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8919, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 469.376013][T17480] loop2: detected capacity change from 0 to 262144 [ 469.389328][T17478] EXT4-fs (loop3): unsupported descriptor size 0 13:44:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0xd04, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8fc, 0x8, 0x0, 0x1, [{0x94, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @empty}}]}, {0x350, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x2fc, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c025ae8231e7aadd5d65f887e2bd3369036318dd0684969ac24b0f7a29ff1ba5"}]}, {0x4a8, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x494, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @private}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}]}]}]}, {0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT4={0x14}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}]}]}, @WGDEVICE_A_PEERS={0x3f4, 0x8, 0x0, 0x1, [{0x78, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x378, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x334, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}]}]}]}, 0xd04}}, 0x0) 13:44:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 469.532175][T17482] IPVS: ftp: loaded support on port[0] = 21 [ 469.545618][T17502] IPVS: ftp: loaded support on port[0] = 21 13:44:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8916, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 469.768349][T17545] loop3: detected capacity change from 0 to 524288 13:44:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x25, &(0x7f0000000040)=@gcm_128={{}, "01bca5ca6d06cf29", "5fe8c72d5d95c2000589c184433643b9", "74b9cfc5", "b3f62870c871a08b"}, 0x28) [ 469.874291][T17560] loop2: detected capacity change from 0 to 262144 [ 469.951505][T17545] EXT4-fs (loop3): unsupported descriptor size 0 [ 470.035018][T17560] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002dc0)='pagemap\x00') read$FUSE(r0, 0x0, 0x0) 13:44:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102}, @nl=@unspec, @l2tp={0x2, 0x0, @remote}, 0x5436, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='veth1_to_bond\x00', 0x1, 0x7f, 0x100}) [ 470.082408][T17560] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 470.362964][T17597] loop3: detected capacity change from 0 to 524288 [ 470.430694][T17597] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 470.464726][T17600] loop2: detected capacity change from 0 to 262144 [ 470.540844][T17600] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 470.629121][T17600] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) 13:44:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1a}, 0x40) 13:44:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x9c}, {0x6}]}) 13:44:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 473.427877][T17632] loop3: detected capacity change from 0 to 524288 13:44:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) [ 473.492955][T17632] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 473.524283][T17634] loop2: detected capacity change from 0 to 262144 [ 473.622400][T17634] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 473.649288][T17640] IPVS: ftp: loaded support on port[0] = 21 13:44:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x94, 0x0, 0x0, 0x56}]}) 13:44:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000140)=ANY=[@ANYBLOB="61d869869a"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 473.723516][T17634] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) [ 473.875087][T17670] IPVS: ftp: loaded support on port[0] = 21 13:44:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:43 executing program 4: clone(0x501ac480, 0x0, 0x0, 0x0, 0x0) 13:44:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) [ 474.036007][T17675] loop3: detected capacity change from 0 to 524288 [ 474.105850][T17675] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 474.152385][T17698] loop2: detected capacity change from 0 to 262144 [ 474.214621][T17698] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 474.218366][T17695] IPVS: ftp: loaded support on port[0] = 21 [ 474.224535][T17698] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 474.385047][T17706] IPVS: ftp: loaded support on port[0] = 21 13:44:43 executing program 0: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x5}, &(0x7f0000000180), 0x0) 13:44:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) 13:44:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$usbfs(r0, 0x0, 0x0) 13:44:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 474.830885][T17757] loop3: detected capacity change from 0 to 524288 [ 474.872773][T17757] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 474.878894][T17765] IPVS: ftp: loaded support on port[0] = 21 13:44:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) [ 475.050557][T17706] IPVS: ftp: loaded support on port[0] = 21 [ 475.123121][T17779] loop2: detected capacity change from 0 to 262144 13:44:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x4}}], 0x18}}], 0x1, 0x0) [ 475.260642][T17779] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 475.270727][T17779] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 475.273535][T17810] IPVS: ftp: loaded support on port[0] = 21 [ 475.327157][T17798] loop3: detected capacity change from 0 to 524288 13:44:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8918, &(0x7f00000000c0)={'sit0\x00', 0x0}) [ 475.409380][T17798] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 475.645577][T17845] loop2: detected capacity change from 0 to 262144 [ 475.691369][T17845] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 475.710271][T17845] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0xff, 0x1}, 0x20) 13:44:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) read$FUSE(r4, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = syz_open_procfs(r3, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r9, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r12, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r12, @ANYRES32=r2, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) 13:44:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x88, 0xa, 0x0, &(0x7f0000000080)) 13:44:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8904, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:48 executing program 0: socket$inet6(0xa, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="69609415fb0101c2fc7df5b85584031d72e5aba0e4f64b2de08c617f57dbcf93c22fb3a7e740477b9dd1d68661bfea5e75f0ab5e9d7e65fa8bc18a043802592fd1d8194679ba5e349e8be87a19b924dd388a59624896912a7797", 0x5a, 0x100000000}]) [ 479.425925][T17889] IPVS: ftp: loaded support on port[0] = 21 13:44:49 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000fe8000/0x1000)=nil) [ 479.482523][T17891] loop2: detected capacity change from 0 to 262144 [ 479.513279][T17895] loop3: detected capacity change from 0 to 524288 13:44:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x10002) [ 479.575538][T17895] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 479.603950][T17891] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 479.656957][T17891] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 479.686734][T17927] loop0: detected capacity change from 0 to 135266304 13:44:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:49 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000fe8000/0x1000)=nil) 13:44:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a2, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 480.006528][T17946] loop3: detected capacity change from 0 to 524288 13:44:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x4020940d, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8971, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) [ 480.084869][T17946] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:44:49 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000fe8000/0x1000)=nil) [ 480.182352][T17950] loop2: detected capacity change from 0 to 262144 [ 480.221662][T17950] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 13:44:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 480.249668][T17950] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:49 executing program 0: pipe(&(0x7f0000000040)) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 13:44:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) [ 480.453768][T17969] loop3: detected capacity change from 0 to 524288 [ 480.468127][T17969] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:44:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@exit], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:50 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000fe8000/0x1000)=nil) 13:44:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:50 executing program 0: syz_read_part_table(0x2, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x28, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x1) 13:44:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}) [ 480.684685][T17980] loop2: detected capacity change from 0 to 262144 [ 480.757155][T17980] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 480.848968][T17980] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:50 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:44:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 480.960572][T17995] loop3: detected capacity change from 0 to 524288 13:44:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x84}, {0x6}]}) 13:44:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002e00)=[{{&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, &(0x7f00000021c0)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x10}}], 0x40}}], 0x1, 0x0) [ 481.110369][T17995] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:44:50 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) 13:44:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:50 executing program 1: socket$inet6(0xa, 0x3, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x2) syz_read_part_table(0x2, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="69609415fb0101c2fc7df5b85584031d72e5aba0e4f64b2de08c617f57dbcf93c22fb3a7e740477b9dd1d68661bfea5e75f0ab5e9d7e65fa8bc18a043802592fd1d8194679ba5e349e8be87a19b924dd388a59624896912a7797714ccce82007b90b69538b196dea51ebaccbc26a8cd0f6b2b5d79cd90ac49222cb04517cb2cae5fa91feb143b8e34f9aa346eb7dfc0d62cac7fe5fa9433321c6a753ce8521a1075fa481fbcf7a8a39", 0xa9, 0x100000000}, {0x0, 0x0, 0x8}]) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x17c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x134, 0x8, 0x0, 0x1, [{0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x604e14e7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f2f7b59}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19b567cf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x252d4010}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1aff63a3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a5dc3a8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x33}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x384caf95}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24552929}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23af3685}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x69e3516e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x538f444b}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xffffffff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d6c5ce6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2300d895}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x762378f5}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10acdf7e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x90}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6bae3c3f}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x48a902e4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x513564dd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x64b502fb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5feb248e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e28ccf1}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x17c}, 0x1, 0x0, 0x0, 0x800}, 0x1) [ 481.258640][ T35] audit: type=1326 audit(1607262290.746:56): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=18008 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 481.289861][T18013] loop2: detected capacity change from 0 to 262144 13:44:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev}}) [ 481.346532][T18013] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 481.363200][T18013] fscrypt (loop2, inode 2): Error -61 getting encryption context [ 481.373633][T18021] loop3: detected capacity change from 0 to 524288 [ 481.449074][T18021] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:44:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f0000000240)) [ 481.553210][T18031] loop1: detected capacity change from 0 to 135266304 13:44:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000001380), 0x4) 13:44:51 executing program 0: r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x20000001}) [ 481.863566][T18043] loop3: detected capacity change from 0 to 524288 [ 481.892797][T18043] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 13:44:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 481.956163][ T35] audit: type=1326 audit(1607262291.436:57): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=18008 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @empty}}}}) 13:44:51 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x2, r1) 13:44:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x3, 0xdf, &(0x7f0000000440)=""/223, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@private2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}) 13:44:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0xe8) 13:44:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMK(r0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000027c0)='nl80211\x00') [ 482.173594][T18065] loop2: detected capacity change from 0 to 262144 [ 482.198244][T18069] loop3: detected capacity change from 0 to 524288 13:44:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8917, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 482.248053][T18065] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 482.295027][T18069] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 482.325457][T18065] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000100)={0x2, 0x8, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 13:44:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000002500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000024c0)={&(0x7f0000002580)=ANY=[], 0x239c}}, 0x0) 13:44:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="c8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000380)="e2", 0x1}], 0x2}}, {{&(0x7f00000004c0)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x4, 0x8800) 13:44:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:52 executing program 0: socket$inet6(0xa, 0x3, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x24) syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="69609415fb0101c2fc7df5b85584031d72e5aba0e4f64b2de08c617f57dbcf93c22fb3a7e740477b9dd1d68661bfea5e75f0ab5e9d7e65fa8bc18a043802592fd1d8194679ba5e349e8be87a19b924dd388a59624896912a7797714ccce82007b90b69538b196dea51ebaccbc26a8cd0f6b2b5d79cd90ac49222cb04517cb2cae5fa91feb143b8e34f9aa346eb7dfc0d62cac7fe5fa9433321c6a753ce8521a1075fa481fbcf7a8a393243b6a21bd5af2a3854b9982c9bac6950285f25c1", 0xbe, 0x100000000}, {0x0}]) 13:44:52 executing program 4: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 13:44:52 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100000000}]) 13:44:52 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$netlink(r0, &(0x7f0000004f80)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000004ec0)=[{&(0x7f0000000040)={0x14, 0x2e, 0x800, 0x70bd25, 0x25dfdbff, "", [@typed={0x4, 0x4}]}, 0x14}, {&(0x7f0000000300)={0x3b0, 0x0, 0x8, 0x70bd28, 0x25dfdbfd, "", [@nested={0xa7, 0x8, 0x0, 0x1, [@generic="6b65bbfa42549b1cec9ff0b0f946af2ea0f451a9f67c50496fa62fe5ff7700d4b17e9cacec55b240368535633fde616aef574557da72201a6fd24380b2cdcde315f59316b9fc39697f5388342ef6483134d092712301584d0e225dea71d645b1db84a33c2af75d555d4de8d874fc7fcb6726a60bc5375fc5f128f5265284b6c7d056db71d2ea7c10c966feff5e286f87e456563caaef50a7e45bffdd9975b3f444ccce"]}, @typed={0x8, 0x24, 0x0, 0x0, @pid}, @typed={0x14, 0x4b, 0x0, 0x0, @ipv6=@ipv4={[], [], @loopback}}, @generic="f88abc6967b0bdd619e49a28d5c5a5be8bdd3f0354c7b2666ec48a871bbe7cf056141f7637cc5f46df0db7e199fbbb2e5cd9213fb9f8ac8a88f85596421a7bf591803c932612cc0952b447984e090dffcd052f46b20c775620fbcdeb5f4f41e03be3d3e31df63efe272f1e442fa01902c6c6e9e32302db3a42395dc05740bb49606e911ea4d1ba213818fdb5612d0976528933919d08fff480e3514b75a3ce391b9a81b1eb1db6fe081f3ad704e27ec4460e13743e2c2bffd503d131fe28bbdf93307c07da9614027c5e", @typed={0xb, 0x42, 0x0, 0x0, @str='(\xb6:\xbe\':\x00'}, @nested={0x201, 0x4d, 0x0, 0x1, [@generic="81f5d94b13956e2a38379637b4826912d622e223fa7002506a97b1cd2e78cace66b7a005d41571d49ef1f2ccdba502919adb46fe90d9e5167a68c4eb42e95306dcf8541eb26d8913a1bf8184af4b506bfa5dcff95600a615bc", @typed={0x31, 0x1a, 0x0, 0x0, @binary="e4cf80a498abfb778049d3e6dace4c081a56d62bc994b1a6fc38969dfa5b396c09231ea0706b0989b0ad875241"}, @generic="b290f0398cf6a82bbbb27b2ec26097af898261fec6a892d995f71291cb7ef2292065dcf92cee3bf9b44484da29d2bea90dd2950756c99969dfadcbb262c857d4cf4ac44d048bd28b159aaffa73915315273232ec9526930cfe27b8855684d6e762684610b382d356ec55d94c72d8817b560b6a35d0d51711feb2592d6926d5c697dc5748f6bec8c32877589d7a2efa2da114c6ba62e004265b269237fb0c5741897aceb4fb31a3562bcef484e9ddd046ff225a989d10d6", @generic="10aab2a6b00cb31df3001da817d29ce3a719ae2cb5710e463da8879c5290ad24fefb71f3898d0c81d8ae503f32af41ab655567c797472d3fe80ae9725c7f75aab13dd367c4517b7992aac2825c38104b97d327798bac4832cc845f9fc3b27d70fa137dcb6d967d8eb2a8b0d320e8f990c4fdf11bbfd2650339bf16222c3921e463c809caecc06fd3bb792a59a4d4ac190b8c0aa384a0353edce2f1d646f4c32d98645ba19aca67b066c38a9e26888de17803faf9530f03fce9"]}]}, 0x3b0}, {&(0x7f00000006c0)={0x358, 0x0, 0x0, 0x0, 0x0, "", [@generic="8cd2ca3f87b87c2ef504e2f594ca9d0081ccbb51356c5532b9651b65905286070534", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x7, 0x0, 0x0, 0x0, @str=')&\x00'}, @nested={0x219, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}, @generic="5453d0cd8b88a9f52f4dde11b0f12a2af43d793877c9c964aa5d7a6511fcfe41f613ed5695df45eed4ce8f482d8852b8181a330316510d27f74c4b112f288a2a28faa607c3c8dccd1847f2ea9cf9b5dfbc4fb9ca337d1ecfd12ce88d30dbdc4429d7e1f616e8fe6b9cc15a3630257768d9990102a63f5c5ac5f350244cc8af2c6c1c77bb7fa0734481ec237375e0f616e636caee15e3e5b9830ffd6318576b75a80e67e1c5b2b5e6538366b1ff1e145eeaf517", @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="cbe209bac3d908a1c784aca00508da5b200b7e8569dee051ebd60adca4d64df4690a4d436e4a15e767c69b924a664b4ae3664d1c81d084de1e33cf7a764d2579c6deda8525df682451a24eb249e5f8a9fc9b800c93d2ff93de330a89c83bca3bb6f188747b0a5b6a2d8204fc1cea0ee6893a3df9f31b893f9d8e6a31da556aabe128144c7e1b81da589307d7da69", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="4eb8717a7bbb547f652294c5722a44bef94be179f482f17139846f566adb8453103e5970834dfd6e570a4a1016407cc279bad2266d563be858581758d7fd5459c790e5464d397a21562f0666565540dbc79487744757c24e2050c47c6fa1deaec3cc508f4d1a5e7a60c6755b20b87df944cd1d3affa20ea4fd1c287a82a9907ca6abc7711a8fd18b30300d28300ac84a65945b24730e434a1195748cb333072d2e88174e8625f8b872f09016e2bcc145"]}, @typed={0x4}, @generic="83c51c4620b872e32c36c0eb223919ab38a864e4116cc533ea3bebe94922e6a8d1e69b374cb22e679e3d65d1c1c55eb3bd6e0dacd667ab8cfa66f2734f010278abae797732b23b6001bb1157709c089c308072cc005f25b7a82968e96c5df3e0cdc93fba84eb519d39b56196231c433a5c062fd8175347993b5a5624f48bf329529f3414acb79738a9356565a012c35c9e71ebdb7311af607753a6b61dea9c6d1a7257a307a19448ba02266954535d03932441e7fac00429e31e1e1c04e1ef7c91fef1226e1dc41cc57b3fbd2d0a3f8749254ce90f8cbc8c2db7d5fed371073e8afa6545a8729310ca135acaa5dfc5a424dc84"]}, 0x358}, {&(0x7f0000000080)={0x198, 0x0, 0x0, 0x0, 0x0, "", [@generic="03d7b616247b40960db53e8ea8e0d2c959ac546c88be307036b2d89fee5254f45032f723cc4bda52462192b7b4a5b938bd3c6f15eea3d156b8043501513c4b7985d130a102c578b23c9a52742397d57e2f838ad0cc0585025a3ffbb4a2d6c1abe64959ae61e138dc95d08b38b63b24a6283c09fee8c922b80d7996895ae1efbc0d39a7e3504dc0ebf7edd6df1bce18db039380a1e53bf31f719f8830116c8edf53f7c7fa717c189bca4080dad8a15b72eb2f8cf8100181ec5dd8f04272382b65ea57087b461a18758d0c24047a44b9a99f55525065", @typed={0xad, 0x0, 0x0, 0x0, @binary="4a2ac1171471bf8de0ab5af3fa231f85a2facedb2055aa18225983dc60f21c86b5a2e645f72eecb556c0c2ec5b3fa80633e5de472f448bfca2116202b7231ddaef20e120bbc55d9ebeca2726144b0d6640c30d05880d2097949986d7cf96cb690f362cff326d557c697e1bf945c01096ccf1e913e6f2af7328bd8c8dcfd07de31394f695fff0c1ed43881e9b4aa8a8471e950cddc87f76416792519669f892b3d41271aa75c489ab80"}]}, 0x198}, {&(0x7f0000000a40)={0x10b4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x10a4, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x7d, 0x0, 0x0, 0x0, @binary="369b8bcb99fe03c0127ec44edbf2ac37c7d7e22a947ac863ffc659510eab69460f89e33ce44e51cb5560ce73e5f734ffb7f78d48606d9cbad2050374c834273a7359f2f10da824bfaa61bda92b7383ca0174a465f4f042719bd35cfb60fb75826940411d82209793743085d9b86864a9edca392792d9fb2ae6"}, @typed={0x1001, 0x0, 0x0, 0x0, @binary="ca6f42174ecd3b4a89171ac3e84ce31564547dff65b1b6666c60982929377f1cb4c5702773c6e27771ef3ef9da3e416157b71ac597d41f46f64fa1b6cf23e900147ccb7d8de1821ad5d74c126f67276d1f97638b164ec4820abd372e1bd8a160e54c9f3e5d8310adbbe59e21a079bddd9484eb4c9e89991bd742b9259eabc22fa962614954d90b265d2558990441e2540ed26abb3cb1d2c706dfb2e6be151bae9ff3e5cbf097db7ab39e683734ab48c3486efb99b465d10da013697878ec65acbb53f1614cb87799739fbedc4816236adac3d74ab55077fe0fba1d44bb4740a853993b5147bd6f914c33cdeb68ade2afa7e5ef13b964c257a411e9bec98ca8d74b3c607585b5644eb75d6adde5e7bb177cf95bf86d0e8f28a6c9bf21f7ce2b2a44a9e079a27614b81d8f7d73194a19a0d87a230ee63ded088cbdfda53a9d4c46ea64d8b15a315af6158d1b0bc5054fe93381d147e60cfc7b5f95e7e2df60503a531147d7b3d3da5252da3a1a41afce3660d60d8c81e6a2abf8648de53f36859aa513fa2db330da3084d0d46df9b11c6da46deb0dca1c7297f9eac48e1e6f9b01055d4e660b9b24bb80047701b752f5e24b82116d26fc7cff6deef68846b05e94d2ff3cf8fa1902ef209d750b3cbfcca555f82e34e31834ad35fe6a58db4cd736e99e11b23d61873fd5f2e4b2bf83aa406eadea4afcb0047f1a2f70b23aba79380f7559d50bee637a4e325a4a2b65477bdc4fb028aaacefd7a8a94f788609a766783aa2876bf1d9909c4a2fb4113940c6fda1a4407517f97ef95ead0093b1dd8dd05e53db774ae7dbd3c5e48f7f35c833fc46c63492cc88c5456dbe61e0978b1a5876991f14225686927959d02ec276b58fd011ac886a3947b2ea046452c1cc82fcd0fd8153645d139a375d67238097dd52c0d99101d276d1802687a390e3b231ea6fea78ee4c36476e45fd33f645ddba9969e864b5cf1e2f78b83293d958b2db2eeac16ef137aa38e40b0f9601038df219bd4bda829434da32dac213b7ffef7507b742830eee3f91d38d976f99bda0e509535a4d6410298d1f88d8a3c7db314a335379dbe1d72bb71d8267a45e827dc2a60b0e0e3bddfb038db8abd237901203cfcdb0fce0214662776786978faa748229508557d7e3efe84bba8feafb51e2946039f2ecfde4a945b1c64916ad75608473c0720c3f3aa28cecbd84ae1b280c136f5cbb4ce9f71b3f23b04aa3499caf0814b46f072ea44afd50529a509e59edbb5e6f4ab3239c2356d7305d1dae6b61a5fd20dfe4be416dead097dc970570c782412b7233c35bc98c5f9c314ca9e0cde6b2bbb6d184ebc896dc5628dc94478030cce0409c3890227009b2d27442a78f13b13c77425493e2a29c71f04fcc869e330613eaff0b5cc5b9ab0647bcc4d46d93e3f3c40c9f8086397c971cb6df34bfa64257b965e888cbaa92968990f5bcbd7ccd44c1a0d75dd698a5130aae54bc1750c1e30409283dcd1ca003c3e892033567fbfe02931515ce7b61e1bf62e366e05d213a02c2b95f23c5da306c4e6ea69150414a83ee9c0164c375227883d027ad70facc957dfba3b5f1be4607af1363a3e9621f8566f9d9cfc3e97229d1adf1032842b63bdbf80735e7487f06ac8ade20eb5c03b0c0cb1c1a1cb48530f0ce8cf9320350fb572fa61c40afb5275bcdcea3c4c8085f04ff4b210ff91dfd12e434fb265c4cdbcbf3db725a103526579f0afc1000dd8dc90771d7d45a0e1725350f2a8ce4afbdcaa7b1a77dd9fad814d06463f1f3e0a5ecd1822e45df32aad7a076055703cd6cb358d6c8f47f79ca12fcbcef580f2bbc6f3507b74362c52963e8a897ec678eb3b2d78295baa4b5aa0bb2e2af300e0cbd869e5c18fff663177be881793d1e3d81118254a7a209f851591f844be9b07b8866d3e3ed424eb3d334299ff0c5a4ba2664c6c7b98146dcc6d6064ee9547c09dbd05bf6a643aa69183e40256673b7131c65873f3c462a6f09b87b21732c78c80e12bee8f080a2d76a01fd6c7280244fefaea47461cce2fe9bde652f106cf2765d3b91d23308fe34634383dae11321845449fc1b8a44bf44c147af933c0fdacb53096f3ed8c2adab86c4b08cc65b804b91b0662ac8af04b72bc69197b427acc3937c0b149c7815b692de8597e6a51c651368479b0e8de2117e54b76d5db813ba9ff19f206da54aa7565f597dedbb3950c8f4ff5777c1f634396c0a78bb4828ded00745b924322b950477925015b544f80cc9e36316c3053d20db5055155c30e3492192088d233925af308ddf2a8e416ae171ef9f8d7fd8d843c8f0e61cbd0a655bfec29c605f95518a1b931e9eaa378012030e281347466e52ab42768d6271b9a6317b56bb9d28ead1ed1f5c7f94677a8ac871e1aecbb00f25d8a88fbcb4cba73e8bb00938d7ef5b826c05139f0b3987f458df47c3f14e05e377a627c34432a6ea4e23cbde74b6e9156f38b2bb7fc615a64b11a4262142b35710a2d177225e300b5dcd80467d3435a8fa528ac9b878a81bc22328554c2d3c125fac295cafae7c6a13b368ab07abe0246289b293b904ee8592cc117b7dda71fef669568dee99c619cf66d72cd1cf0e5a6f7c35049ff8e6a877b9ec37fe2d04aad5dcf6410895e9e4de4b11a9f6f5b015c05255ad182a9c97a2f85afd0d9d0438abed7d383abafdd91778a7e2ef45023b2c7187d3844cbd173280585705153f5d3cfe424facb7f506b16027270aab5de93a2dbbb4aca0f3ca298622f8c4967943f1726a462f10efe15eab5e23fc7f84434f789854616ff20c0453698a7eb3b63289bbef671b1414584f4f858a6e5b6744249d0d9a7a574e0c728d5f1109e3c0a19091acde3347d42865340225c8f8adb5547c15529c724edeb0d22f4d297bd0130e2963f6bb2fd5e4ac94563053809180963a8e3c7d3403c5662e3ead6a4c6d27d3f6c6c26e8557f7f5d1a5d428286135af832fb20d392a777ffa2e863189fbd4eb06315db0638b62b48c55654cb4c0e32f6cc39b5d6ea9512c795a9f8c077404cc2eaf0ec0d2c98e36c265ff48b4f3639228da38718a82f2d96eef69d9247f6f46a42cd0fc621cc45ceca58b839a1ab6ef8d13f893a5c4bee91576ea2d47cb3939904217e590ea145c32144532e945aad1d09cf98799f161d0fd38defcd4c34d333695565fc6caf0cfa0b3c91fcf3ed1c6a859999e9c2718677763ccd0dcad13869b2a6f0c34fe8087c848fd3af3b5aec1ed104145aed29d9a47e2cdd5d81e865de439c91d44b0da8eb90a063c85fe3c1921c96e2f43232ec3f358487f59630826bdfdd26e231f51e9320db2635461dc6085b24588842ba3099af7c617db7f71d880fb52113e4488450040abbb6632f52775cfead5597e4e86dce1a19289c6209059c97249dad8bd059524624b6c2bd68e7fc26913ae585b5b483de2dab9b2eacde8b6c8d138a35258b19bc138e77eeeeb7ba9ccc9e20b947d4923a3b98844ef92e5cf1c8e7d8aa20afbbf6ddfde5d8c8c8f3d5b4181278c0db73021e33621f1984e08d6b3857308d978e02824ff10efbebb0919a21cddfd7027f8b8de5f2c7bd009f7065193a3d8788e9f6d782ec5e840424fd70fffff2706a9c10d93b336a6202c333f51358f3148f96bdf4d5a1b6dfef6389a380f50b42df84388baf3b887f70889e583449c727e487ec6a3e69d88a63458782abd2f91de4843169624f6f26d0d64e68d5cad91d80bbfc0bfc491d4edeed297c45f1df45a744d6a278b7a401f8a6b8a19ab3d2be3dc0c342124095c5a1e9546a74d9f3fec44428faeb894ffcd544231ee6ba64d2d001c660b3bef626dfc9ac301fcaf224c8738cc4b34bc69f41cd85a305545bf21d3ae7058796b745c55812c8a37cfb71b649b4b7453e229bb3c9efd2e0b105e4e72b678d5d79ab31a73867a6035774d77c9e1b94ca36f5694eb8c057bbfe13ae915b37b53f8151c09e3018bac15528ceeef78cdb44367ff7883593467fa145b5a1aeff3f6d95e0777bc25bad94396602e81d868b410a74fa3944c986003ff2055e1c16358f9c57e2f51a22781aa5c03eae1154ea351fa2423d1a465ac283db65a27457d094bd2b7df7e4eaa9460f947d8bad99598dd4aeeb827b7f0db7439abad647b8af025c89362e8f99bcd3cda001f3c248c8e852c301a58f1046ac69e8871f9f6a5e30f94f4847f9acab51a0fafe724c734428aacc8e2684fac024684f5228c33f3337d29e3dec407aeb3aea4cb9b027441fa1f99fbcd25c8cb0763f4d44c40c6e6b8a02a70a97da6b1ab86676ba68c55913288c1679cd03c58b20487d0ff128b1aa1ca915ad13db756e887545f840db96c0497e8a801d8008f0837b85c88ad5c58ab12d0f48fb5df9bb68e8621138a3cd22918cbf6558093d83f4d4c70d90fa9fc67c4ff650badaeefb53e0070474d9aa0c2847595882758f4bb2483d592894e8d7d68393a6672a8b464ab5043601b35d9313ff2f2e312bea0df24914241439926efb44a49e4f1c1f0ff2c2867a4f1ed367da8adc09cebcd7cdf69af58489d03c8732c0dd36473d01bc199587dd1b50f8ccada010201e965272762abe7baa6e587f8d35f9ab6b400130b1f3ade6970f75a7fadbe486e4a4e2059f0da87a8a8379665037cf31a626c6f18a7a2e0188ed0749e4c9ff8c5ebae941c52d3946cc3f360cc22ea2f6337943e546226d45737dfd64e5e348677aa97e7ab2d467532337e11e5700b44fd83058ac7d7eed4c123f8d1ac8e3c8b302db30da7c6edd594c90312a9c4cce569dcfaf40eb79bc33abac9f59fd61a945097b22aae9679e986fac9ee99d8a07e7889b3050a0db171c50b5703d1e568b2bec0a70fae7907aa5e500e2cb2904769af08cd97e37685c0c319ab4e369603eedd318a22f3ff4c7e496654452f4327dd123e134f273b6d99395eeca6196d5031a408d87d43ff50b2a5173319d89c91e0805093fa8721aa84a1943c7d6443c118c16ea4dc8845cbe743e5fbe7804741203168e51c5d33f0fac3cd34c51c9234974c0b67d636b73014da0f34b483334124775fb664af2b01bbb834f735eb79eacd97b3e39684d85749608a2b13547842124a7e584b964ff9e278a77578317f6cd969c64e0ceebbac3b148709b072d6ffe509d6de5e930e319362e95b359b6b2b69b5a534adf896879ad6c5d46bc03131ecd108ee9bb103f5fdf73f66ce858181a2567919bb3cc26a3a1e22630215a1d9f7679d5c5d9e349b1a359b2338447d869dea42e10de52fe75ecf6d15131236fc0e9b8b203f60f37094cbe40717c9a4d8af056a32ce74aa11ff2388ec690f53a8b7a44cbc3d299442b1cddaf06558ca8f75f33ef0731e1963ebc83bba2b32af8da609825ea408b1ad6fd9301b79902e07dd0bffe4c5860c8c3997c795a7f22a66980a1d26296f8e3401c9e99cfe8e8535430ddd87ddc65b13bc629ebbf0094a14a18298c6efb5beb7c1b958e5aac112c0b05d999fb23b70d7a28bb03edb7bad73863bd53567b3919cc5c9e5fca8fd12cfc4d1b76bfbb067a29d57554a2758859a8fa14ae3890f1f6adfd1b69c22c9f4b8a99669ef99c8f779283175514c3e91c57e265c03e0932b962b5d17f31091512c0a241baa03238b092fe438adcdfc1163f079e537f0c480f321189863b5ea2dca4ca64eb5cfd5daddf68e95d2a0f06a235138b8703cdc261bd60b7b8bbd4e770566774b5b6ab6313fa101dc06a3f5a0343e7ec0d6d4eaa4d92704748af1c2359d6ad793a551a4552ff7d62d754bbcb70c191c1f"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}]}]}, 0x10b4}, {&(0x7f0000001b00)={0x2d0, 0x0, 0x0, 0x0, 0x0, "", [@generic="b44066f10232f11843b6fce62b6a9b6fc0765a6daf44bf91a3ab6c1ee3a576d4fe9980db3e364624871c1b27b2225ad14e8b35a14352324284e167626768cb6afcc9f09a0b070228efb486e9c2d9f1d0a6ed82cbaa6a2f457468f29c4066abb367c866e7913735e103793e11551f6b19406e4838277b1996ae922f874c1ac9e7ed0323e71c199c5594e966d2cbd7d436f5635821710c79ca5274adff47603af86f7ea15e286f", @nested={0x111, 0x0, 0x0, 0x1, [@generic="144b217b3d1e805fcdbb03d102a8951a879c27be4439f6f8d3054514e9fbdbdd453fef94", @generic="4eedc3b612f3c94e83ee7d02bdf9ff565e20c4fe6a710db409625c3f2a9559f58414f628615ca8f00bca4ecfc1716c586ecb7d00e2f07f2bc22dd095f9e03ef1fd083c097264026204686884d3484fdcb8cc1bfa53e46f6070fd280511814423ab64e2773b6f84f98c3f9480b5e4d4ca08749726192822244fa68a025bbc659cc7a1eff6", @generic="a10e8169303e31a6057bdc1b8338053090af0fc578b65508ed4dff2aa5b3f276c16367c6ced3b61c637937a24ff22bec808310cd189fc5b005442eb25e4bf4094a8742a2eae7f032d6ce3207d89573bd51ec7f0ff28b329488afd7cc86a88131adeaf2115d"]}, @generic="913cf7f31b41f8d072c9f20beb87acc7a8e0220b7891ae7d36a912e59fc9f58bcae9d2e8ff44d9403df50824714ab2c8d6f53d0c72e9baac57fc74681319cb58fe9a0189601c7afc8c846d2b4900fd", @nested={0xb1, 0x0, 0x0, 0x1, [@generic="13fc5d3f090a31af38fc87d0b37daadfdee9327722f4db3b2cfd6d64e598486cc715e6fbba635357f0bf2215ac735fe38bf4fb3f57a918cc14cfd764b6988d354dd5a852c4871b615bd3251768ef1975fdc34ab0e7fbff29afda2f2a30ea04affc7a90096827ddc70ec3c54c9909092105f8a145e19a09b7be96e84974abd81fa2ed9fb9ca1774383dc4af370a0d4c551635a73ec0cf483f4026251a5266a029c1", @typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast2}]}]}, 0x2d0}, {&(0x7f0000005040)={0x10}, 0x10}], 0x7, 0x0, 0x0, 0x40000}, 0x20000800) [ 482.721953][T18104] loop2: detected capacity change from 0 to 262144 [ 482.754816][T18104] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 482.761432][T18102] loop3: detected capacity change from 0 to 524288 [ 482.786433][T18104] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x32}}], 0x18}}], 0x1, 0x0) [ 482.863317][T18116] loop1: detected capacity change from 0 to 135266304 13:44:52 executing program 4: io_setup(0xc189, &(0x7f0000000380)=0x0) io_submit(r0, 0x0, 0x0) [ 482.931961][T18102] EXT4-fs (loop3): invalid first ino: 0 [ 482.956360][T18124] loop0: detected capacity change from 0 to 135266304 13:44:52 executing program 5: pipe2$9p(0x0, 0x184000) 13:44:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x8948, &(0x7f00000000c0)={'sit0\x00', 0x0}) 13:44:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, &(0x7f00000003c0)=@framed={{}, [@map_val]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0xdf, &(0x7f0000000440)=""/223, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:44:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:52 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000007c00)={0x77359400}) 13:44:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x9, &(0x7f0000000780)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x168, 0x168, 0xffffffff, 0x0, 0x168, 0x5d0, 0x5d0, 0xffffffff, 0x5d0, 0x5d0, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@local, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv4=@loopback, @port, @icmp_id}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'virt_wifi0\x00', 'ip_vti0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4=@dev, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 13:44:53 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') socket$inet6_udp(0xa, 0x2, 0x0) 13:44:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x3}) 13:44:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x42, 0x0) write$nbd(r0, 0x0, 0x0) [ 483.591501][T18149] loop2: detected capacity change from 0 to 262144 13:44:53 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{0x0, 0x0, 0x100000000}, {0x0}]) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x1) [ 483.676701][T18153] loop3: detected capacity change from 0 to 524288 13:44:53 executing program 4: socket$inet6(0xa, 0x3, 0x4) [ 483.737377][T18153] EXT4-fs (loop3): invalid first ino: 0 [ 483.743777][T18149] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 483.762749][T18167] loop5: detected capacity change from 0 to 135266304 [ 483.775895][T18149] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x5, 0x4) 13:44:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') read$FUSE(r0, &(0x7f0000002e00)={0x2020}, 0x2020) 13:44:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x2, 0xc, 0x0) 13:44:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:53 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{0x0, 0x0, 0x100000000}, {0x0}]) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x1) [ 484.135448][T18186] loop3: detected capacity change from 0 to 524288 13:44:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') write$FUSE_OPEN(r0, 0x0, 0x0) 13:44:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) 13:44:53 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{0x0, 0x0, 0x100000000}, {0x0}]) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x1) [ 484.248391][T18187] loop2: detected capacity change from 0 to 262144 13:44:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x6, &(0x7f0000000040)=@gcm_128={{}, "01bca5ca6d06cf29", "5fe8c72d5d95c2000589c184433643b9", "74b9cfc5", "b3f62870c871a08b"}, 0x28) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(r5, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = syz_open_procfs(r4, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r10, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r14, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r10, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r7, @ANYRES32=r12, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r14, @ANYRES32=r2, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20c10, &(0x7f0000000300)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'erspan0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB="780032d40000000700009c006600001f2f9078e0000001ac141438442cf131e0000002000000040a010100000002ffffffff001c0dde84d3b34902f25b00e40c000000000000000701940400004454fc71ffffffff000000070a01010000000080ffffffff000400090a010103000000000000000200000028640101010000001f7f000001000000097f00000104000005e000000100000519ffff0000a61a00000000000013000000"]}) socket$inet(0x2, 0x5, 0x8) [ 484.315184][T18186] EXT4-fs (loop3): invalid first ino: 0 [ 484.337217][T18187] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 484.397310][T18187] fscrypt (loop2, inode 2): Error -61 getting encryption context 13:44:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 484.510789][T18208] loop5: detected capacity change from 0 to 135266304 13:44:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@dstopts={{0x18, 0x29, 0x8}}], 0x18}}], 0x1, 0x0) [ 484.591798][T18213] IPVS: ftp: loaded support on port[0] = 21 13:44:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8947, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 484.743559][T18221] loop3: detected capacity change from 0 to 524288 [ 484.790929][T18221] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 484.927636][T18233] loop2: detected capacity change from 0 to 262144 13:44:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:54 executing program 1: setreuid(0x0, 0xee00) 13:44:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) 13:44:54 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000000340)=[{0x0, 0x0, 0x100000000}, {0x0}]) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x1) [ 485.014464][T18214] IPVS: ftp: loaded support on port[0] = 21 [ 485.107740][T18260] loop5: detected capacity change from 0 to 135266304 13:44:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8934, &(0x7f0000000a00)={'tunl0\x00', 0x0}) 13:44:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 485.250436][T18278] loop3: detected capacity change from 0 to 524288 [ 485.304301][T18278] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6}]}) 13:44:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x6, &(0x7f0000000040)=@gcm_128={{}, "01bca5ca6d06cf29", "5fe8c72d5d95c2000589c184433643b9", "74b9cfc5", "b3f62870c871a08b"}, 0x28) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(r5, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = syz_open_procfs(r4, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r10, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r14, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r10, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r7, @ANYRES32=r12, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r14, @ANYRES32=r2, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20c10, &(0x7f0000000300)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'erspan0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB="780032d40000000700009c006600001f2f9078e0000001ac141438442cf131e0000002000000040a010100000002ffffffff001c0dde84d3b34902f25b00e40c000000000000000701940400004454fc71ffffffff000000070a01010000000080ffffffff000400090a010103000000000000000200000028640101010000001f7f000001000000097f00000104000005e000000100000519ffff0000a61a00000000000013000000"]}) socket$inet(0x2, 0x5, 0x8) 13:44:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) 13:44:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8948, &(0x7f0000000a00)={'tunl0\x00', 0x0}) [ 485.557703][T18297] loop2: detected capacity change from 0 to 262144 [ 485.643357][ T35] audit: type=1326 audit(1607262295.127:58): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=18296 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 13:44:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) 13:44:55 executing program 1: syz_io_uring_complete(0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) [ 485.808108][T18311] IPVS: ftp: loaded support on port[0] = 21 [ 485.862332][T18310] loop3: detected capacity change from 0 to 524288 [ 485.905632][T18310] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:55 executing program 0: syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@hash='hash'}, {@fowner_eq={'fowner'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) [ 485.964212][T18323] loop2: detected capacity change from 0 to 262144 13:44:55 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x18}, 0x10) 13:44:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 486.209092][T18350] fuse: Bad value for 'fd' [ 486.227520][T18350] fuse: Bad value for 'fd' [ 486.302156][T18356] loop3: detected capacity change from 0 to 524288 [ 486.324633][T18356] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x6, &(0x7f0000000040)=@gcm_128={{}, "01bca5ca6d06cf29", "5fe8c72d5d95c2000589c184433643b9", "74b9cfc5", "b3f62870c871a08b"}, 0x28) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(r5, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = syz_open_procfs(r4, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r10, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r14, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r10, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r7, @ANYRES32=r12, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r14, @ANYRES32=r2, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20c10, &(0x7f0000000300)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'erspan0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="73797a746e6c2ea4c74a081a0000000062e8f449cb45ee1df292fc525f96a00fedc0c50302ee5b59863195c54e4126906ec365a14f648e4d1a46cca2eec66d735da58d6910772712a6c4969688d8c820000c3f329f1c74d23a8e4b28703656271c472c9399c90ed87c7b00d60059357af2f8ca68445c17e6ae939f8d2cf3fc41651c5e53d1cc2fa0149eb502b8ddbcfddc4bf319d0b6d371c3feb3160dc669690092fa17d98b1d45c04d08784c72bd0f5977680a7f4e5ff42fec97821853d8669832e250001859533edc4aba9597ce30011a7d0f95479b6b590787f77142c37ca1bec4044bf83f9a18e6319b8fa0263967ad48f09974d3d9b44b5590f21899dda08be95cc58a0786", @ANYRESHEX, @ANYBLOB="780032d40000000700009c006600001f2f9078e0000001ac141438442cf131e0000002000000040a010100000002ffffffff001c0dde84d3b34902f25b00e40c000000000000000701940400004454fc71ffffffff000000070a01010000000080ffffffff000400090a010103000000000000000200000028640101010000001f7f000001000000097f00000104000005e000000100000519ffff0000a61a00000000000013000000"]}) socket$inet(0x2, 0x5, 0x8) 13:44:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="f1", 0x1}], 0x1, &(0x7f00000013c0)=[@ip_retopts={{0x10}}], 0x10}}, {{&(0x7f0000000a00)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x2, 0x0) 13:44:55 executing program 1: socket$inet6(0xa, 0x1, 0x7fff) 13:44:55 executing program 0: setpriority(0x1, 0x0, 0x4ac) [ 486.356280][ T35] audit: type=1326 audit(1607262295.847:59): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=18296 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460cda code=0x0 [ 486.357402][T18359] loop2: detected capacity change from 0 to 262144 [ 486.499900][T18367] IPVS: ftp: loaded support on port[0] = 21 13:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:56 executing program 1: unshare(0x400) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') 13:44:56 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0/../file0\x00') [ 486.720487][T18380] loop3: detected capacity change from 0 to 524288 13:44:56 executing program 0: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0xc01, 0x3, 0x280, 0xd8, 0x5002004a, 0x0, 0x0, 0x0, 0x1e8, 0x3c8, 0x3c8, 0x1e8, 0x3c8, 0x3, 0x0, {[{{@ip={@private, @empty, 0x0, 0x0, 'vlan0\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0xc8, 0x110, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'vxcan1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) syz_mount_image$v7(&(0x7f0000000100)='v7\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 486.773218][T18380] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x0) [ 486.862950][T18398] loop2: detected capacity change from 0 to 262144 13:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 486.982091][T18414] xt_CT: You must specify a L4 protocol and not use inversions on it 13:44:56 executing program 5: syz_mount_image$v7(&(0x7f0000000100)='v7\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000180)="58bdc2540b2f272f77544f1afe6c3e87b8dd30d36871c9b36002dc283cfb926b04a26011ffefb415efc0b77edc9ddd7efb", 0x31, 0x2a0}], 0x0, &(0x7f0000000040)=ANY=[]) 13:44:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 487.047051][T18414] xt_CT: You must specify a L4 protocol and not use inversions on it [ 487.084751][T18418] loop3: detected capacity change from 0 to 524288 13:44:56 executing program 1: io_setup(0x107, &(0x7f0000000080)=0x0) io_getevents(r0, 0x7, 0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000000)={0x0, 0x3938700}) 13:44:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x6, &(0x7f0000000040)=@gcm_128={{}, "01bca5ca6d06cf29", "5fe8c72d5d95c2000589c184433643b9", "74b9cfc5", "b3f62870c871a08b"}, 0x28) unshare(0x42000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xb0, &(0x7f0000000080)="81d1ed337fbfef8714c766d81ad6c4d767c7e20fa293c5ee4666b1aa7fd11aedb605500c651b33735ef65b5468de8a1288b65299ff4ef76d7b82702fb3e748aa8b81013cfdbc2effc3b84f75a5aba15e1a5f1ca2aca527505a33566430347f5b8350c1b8b6d4ca8c9b4896f800325df254b354babbf1569a3da1108a4fcdf9f260e094d02ae0b9ebcaf0693d624fe169c1c3bae31723f08fe5b8657ffd1f1ad2cc625ab55755a9674cb296b8fe8f75ca"}) munlockall() r1 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') read$FUSE(r1, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r5 = syz_open_procfs(0x0, &(0x7f0000002dc0)='sessionid\x00') r6 = socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(r5, &(0x7f0000002e00)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r10 = syz_open_procfs(r4, &(0x7f0000000240)='net/kcm\x00') read$FUSE(r10, &(0x7f0000004e40)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs(r14, 0x0) sendmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="1dc008446bec8f7ac93a5bc43151244b52f26d75b8ed72b7ccd5285b7c8e63bce9f367a721e04331f51550248f646645103ce9a9d0584fffac3cf2947412978ae0ef895dd8881ac40dc0684c3d944392b8dd572360c4457ed4a687bc937b1f22aebb6f0090f7c32b0868ae9fcda2a50279a862136dca68b3727a6bbc6411c0e8f8248e9c4adab9762a31c621859cdf225e4459d5435170b1b437825e58dde7ebb7da8fcc65619cea2fb5f2671aa7560bfa7290ed6ec1ef1ddbc7724e5a4923e282eadf23b5f5bbec15", 0xc9}, {&(0x7f0000000540)="0e621eab5ee9701cfef8f80d69815e5d2d51b95c6ffd47307dd9062c398f9132db356f02c285549eba9e94bfdb8c7ad61814360023d38b41e19925f044ecfbb96cc2afc5a01e1a3dbf5de45ae20e9672abe0e5c3d97fe669b61d09d10a9d", 0x5e}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r10, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r2, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r7, @ANYRES32=r12, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r10, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="000000001c000000400000000100000002000000", @ANYRES32=r14, @ANYRES32=r2, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r7, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x118, 0x20000000}, 0x40000) syz_mount_image$fuse(&(0x7f0000000280)='fuse\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20c10, &(0x7f0000000300)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@obj_role={'obj_role', 0x3d, 'erspan0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB="780032d40000000700009c006600001f2f9078e0000001ac141438442cf131e0000002000000040a010100000002ffffffff001c0dde84d3b34902f25b00e40c000000000000000701940400004454fc71ffffffff000000070a01010000000080ffffffff000400090a010103000000000000000200000028640101010000001f7f000001000000097f00000104000005e000000100000519ffff0000a61a00000000000013000000"]}) socket$inet(0x2, 0x5, 0x8) 13:44:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x3f}}}}}}]}}, 0x0) [ 487.153835][T18418] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 487.264139][T18423] loop2: detected capacity change from 0 to 262144 [ 487.301862][T18427] IPVS: ftp: loaded support on port[0] = 21 13:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 487.419582][T18437] loop5: detected capacity change from 0 to 1024 13:44:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 487.489641][T18437] VFS: could not find a valid V7 on loop5. 13:44:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "6ae4b7a2f40f6ad6"}) [ 487.619145][T18437] loop5: detected capacity change from 0 to 1024 [ 487.642125][T18466] loop3: detected capacity change from 0 to 524288 [ 487.648980][ T8293] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 487.662649][T18437] VFS: could not find a valid V7 on loop5. [ 487.750046][T18466] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:57 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) [ 487.792682][T18476] loop2: detected capacity change from 0 to 11264 13:44:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x1d, r4}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "ec4540cedf42d93e"}, 0x10}}, 0x0) 13:44:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f00000001c0)=[{}], 0x1) [ 487.897133][T18476] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) 13:44:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x6, 0x0) [ 488.046067][ T8293] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 488.070908][ T8293] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 13:44:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3f) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0x0) [ 488.117973][T18493] loop3: detected capacity change from 0 to 524288 [ 488.119921][ T8293] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 488.201296][T18499] loop2: detected capacity change from 0 to 11264 [ 488.214002][T18499] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) [ 488.229040][T18493] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:44:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) [ 488.323711][ T435] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 488.333642][ T435] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 488.408397][ T8293] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 488.445781][ T8293] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 488.500125][ T8293] usb 1-1: Product: syz [ 488.514030][ T8293] usb 1-1: Manufacturer: syz [ 488.524201][ T8293] usb 1-1: SerialNumber: syz [ 488.875186][ T8293] cdc_ncm 1-1:1.0: bind() failure [ 488.893175][ T8293] cdc_ncm 1-1:1.1: bind() failure [ 488.928410][ T8293] usb 1-1: USB disconnect, device number 4 [ 489.704804][T18513] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 490.074419][T18513] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 490.099220][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 490.126097][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 490.325596][T18513] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 490.364622][T18513] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 13:44:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:44:59 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x420}, 0x420}}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) read$FUSE(r0, &(0x7f0000002600)={0x2020}, 0x2020) 13:44:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:44:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x6, 0x0) 13:44:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x3f}}}}}}]}}, 0x0) 13:44:59 executing program 1: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) fchown(r0, 0x0, 0xee00) [ 490.372645][T18513] usb 1-1: Product: syz [ 490.394612][T18513] usb 1-1: Manufacturer: syz [ 490.402416][T18513] usb 1-1: SerialNumber: syz [ 490.475245][T18513] usb 1-1: can't set config #1, error -71 [ 490.519430][T18513] usb 1-1: USB disconnect, device number 5 [ 490.566727][T18552] loop3: detected capacity change from 0 to 524288 [ 490.606351][T18552] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 490.611045][T18553] loop2: detected capacity change from 0 to 11264 13:45:00 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000840)='/dev/nbd#\x00', 0x0, 0x20005) write$binfmt_elf64(r0, 0x0, 0x0) 13:45:00 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {0x0, 0x0, 0x1000000}], 0x0, &(0x7f0000012400)) [ 490.684486][T18553] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) [ 490.749564][T11445] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 490.757819][T11445] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 13:45:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:45:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8980, &(0x7f0000000000)={'batadv0\x00'}) 13:45:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:45:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 491.007914][T18573] loop4: detected capacity change from 0 to 33554432 13:45:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)={0x18, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4, 0xb}]}, 0x18}}, 0x0) [ 491.084379][T18513] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 491.094669][T18582] loop3: detected capacity change from 0 to 524288 [ 491.116592][T18573] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.182406][T18582] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 491.191234][T18573] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 13:45:00 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4020940d, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:45:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 491.270987][T18573] F2FS-fs (loop4): invalid crc_offset: 0 13:45:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000000000)={'batadv0\x00'}) [ 491.348419][T18573] F2FS-fs (loop4): SIT is corrupted node# 0 vs 1 [ 491.388391][T18573] F2FS-fs (loop4): Failed to initialize F2FS segment manager (-117) [ 491.475045][T18513] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 491.505394][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 491.542677][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 491.567356][T18573] loop4: detected capacity change from 0 to 33554432 [ 491.582141][T18573] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.611310][T18573] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 491.649866][T18573] F2FS-fs (loop4): invalid crc_offset: 0 [ 491.668099][T18573] F2FS-fs (loop4): Failed to initialize F2FS segment manager (-4) [ 491.754280][T18513] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 491.763344][T18513] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 491.783735][T18513] usb 1-1: Product: syz [ 491.814137][T18513] usb 1-1: Manufacturer: syz [ 491.818768][T18513] usb 1-1: SerialNumber: syz [ 492.154274][T18513] cdc_ncm 1-1:1.0: bind() failure [ 492.163115][T18513] cdc_ncm 1-1:1.1: bind() failure [ 492.214205][T18513] usb 1-1: USB disconnect, device number 6 13:45:02 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x3f}}}}}}]}}, 0x0) 13:45:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) 13:45:02 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="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"}) 13:45:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16], 0x24}, 0xe}, 0x0) 13:45:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 13:45:02 executing program 4: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 13:45:02 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff"], 0x2) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) [ 492.886512][T18628] loop3: detected capacity change from 0 to 524288 13:45:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x1, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0xffffffffffffff06}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_PROTOCOL]}, 0x24}}, 0x0) [ 492.969428][T18628] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 13:45:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x3, 0x0, 0x0, 0x80040, &(0x7f0000000900)={[{@utf8='utf8=1'}], [{@smackfsroot={'smackfsroot', 0x3d, 'wlan0\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_eq={'euid'}}]}) statx(r1, &(0x7f0000000480)='./file1\x00', 0x1000, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000440)='security.capability\x00', 0x0, 0x0, 0x3) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FIONCLEX(r0, 0x5450) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x0, &(0x7f0000012900)=ANY=[]) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x820) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 493.033059][T18638] ================================================================================ 13:45:02 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0x5452, &(0x7f0000000040)) [ 493.092039][T18638] UBSAN: array-index-out-of-bounds in arch/x86/kernel/uprobes.c:263:56 13:45:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80037, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000340)={[{@usrjquota='usrjquota='}]}) [ 493.144493][T18638] index 4 is out of range for type 'insn_byte_t [4]' [ 493.187393][T18645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 493.202831][T18638] CPU: 0 PID: 18638 Comm: syz-executor.4 Not tainted 5.10.0-rc6-next-20201201-syzkaller #0 [ 493.212841][T18638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.222914][T18638] Call Trace: [ 493.226247][T18638] dump_stack+0x107/0x163 [ 493.230601][T18638] ubsan_epilogue+0xb/0x5a [ 493.235034][T18638] __ubsan_handle_out_of_bounds.cold+0x62/0x6c [ 493.241210][T18638] arch_uprobe_analyze_insn+0x8f3/0xa40 [ 493.243723][T18513] usb 1-1: new full-speed USB device number 7 using dummy_hcd [ 493.246766][T18638] ? push_emulate_op+0x270/0x270 [ 493.259221][T18638] ? memcpy+0x39/0x60 [ 493.263223][T18638] install_breakpoint.isra.0+0x6c4/0x7c0 [ 493.268892][T18638] uprobe_mmap+0x5ec/0x1080 [ 493.269201][T18647] loop2: detected capacity change from 0 to 262144 [ 493.273409][T18638] ? do_raw_spin_unlock+0x171/0x230 [ 493.273430][T18638] ? uprobe_apply+0x150/0x150 [ 493.273445][T18638] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 493.273472][T18638] mmap_region+0x56c/0x1790 [ 493.300636][T18638] do_mmap+0xcff/0x11d0 [ 493.304818][T18638] vm_mmap_pgoff+0x1b7/0x290 [ 493.309438][T18638] ? randomize_stack_top+0x100/0x100 [ 493.314738][T18638] ? __fget_files+0x288/0x3d0 [ 493.319436][T18638] ksys_mmap_pgoff+0x444/0x580 [ 493.324214][T18638] ? find_mergeable_anon_vma+0x240/0x240 [ 493.329909][T18638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 493.335824][T18638] do_syscall_64+0x2d/0x70 [ 493.341911][T18638] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 493.347810][T18638] RIP: 0033:0x45de79 [ 493.351716][T18638] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.371329][T18638] RSP: 002b:00007f2fcc3e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 493.379762][T18638] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045de79 [ 493.387748][T18638] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020007000 [ 493.395735][T18638] RBP: 000000000118bf78 R08: 0000000000000003 R09: 0000000000000000 [ 493.403723][T18638] R10: 0000000000000412 R11: 0000000000000246 R12: 000000000118bf2c [ 493.411707][T18638] R13: 00007ffd240f5edf R14: 00007f2fcc3e79c0 R15: 000000000118bf2c [ 493.471089][T18647] EXT4-fs error (device loop2): ext4_fill_super:4954: inode #2: comm syz-executor.2: iget: root inode unallocated [ 493.541865][T18647] EXT4-fs (loop2): get root inode failed [ 493.588714][T18647] EXT4-fs (loop2): mount failed [ 493.635219][T18513] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 493.661569][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 13:45:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) [ 493.692124][T18513] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 493.730209][T18657] loop3: detected capacity change from 0 to 524288 [ 493.787937][T18657] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 493.875587][T18513] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 493.904498][T18513] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 493.938263][T18513] usb 1-1: Product: syz [ 493.978528][T18513] usb 1-1: Manufacturer: syz [ 493.990053][T18513] usb 1-1: SerialNumber: syz [ 494.112630][T18638] ================================================================================ [ 494.133434][T18638] Kernel panic - not syncing: panic_on_warn set ... [ 494.140063][T18638] CPU: 0 PID: 18638 Comm: syz-executor.4 Not tainted 5.10.0-rc6-next-20201201-syzkaller #0 [ 494.150046][T18638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.160114][T18638] Call Trace: [ 494.163412][T18638] dump_stack+0x107/0x163 [ 494.167767][T18638] panic+0x306/0x73d [ 494.171681][T18638] ? __warn_printk+0xf3/0xf3 [ 494.176294][T18638] ? ubsan_epilogue+0x3e/0x5a [ 494.180992][T18638] ubsan_epilogue+0x54/0x5a [ 494.185512][T18638] __ubsan_handle_out_of_bounds.cold+0x62/0x6c [ 494.191689][T18638] arch_uprobe_analyze_insn+0x8f3/0xa40 [ 494.197254][T18638] ? push_emulate_op+0x270/0x270 [ 494.202220][T18638] ? memcpy+0x39/0x60 [ 494.206224][T18638] install_breakpoint.isra.0+0x6c4/0x7c0 [ 494.211884][T18638] uprobe_mmap+0x5ec/0x1080 [ 494.216406][T18638] ? do_raw_spin_unlock+0x171/0x230 [ 494.221613][T18638] ? uprobe_apply+0x150/0x150 [ 494.226298][T18638] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 494.232561][T18638] mmap_region+0x56c/0x1790 [ 494.237095][T18638] do_mmap+0xcff/0x11d0 [ 494.241272][T18638] vm_mmap_pgoff+0x1b7/0x290 [ 494.245906][T18638] ? randomize_stack_top+0x100/0x100 [ 494.251295][T18638] ? __fget_files+0x288/0x3d0 [ 494.255993][T18638] ksys_mmap_pgoff+0x444/0x580 [ 494.260823][T18638] ? find_mergeable_anon_vma+0x240/0x240 [ 494.266475][T18638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 494.272390][T18638] do_syscall_64+0x2d/0x70 [ 494.276822][T18638] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 494.282719][T18638] RIP: 0033:0x45de79 [ 494.286631][T18638] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.306266][T18638] RSP: 002b:00007f2fcc3e6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 494.307082][T18513] cdc_ncm 1-1:1.0: bind() failure [ 494.314688][T18638] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045de79 [ 494.314699][T18638] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020007000 [ 494.314709][T18638] RBP: 000000000118bf78 R08: 0000000000000003 R09: 0000000000000000 [ 494.314718][T18638] R10: 0000000000000412 R11: 0000000000000246 R12: 000000000118bf2c [ 494.314736][T18638] R13: 00007ffd240f5edf R14: 00007f2fcc3e79c0 R15: 000000000118bf2c [ 494.320782][T18638] Kernel Offset: disabled [ 494.365172][T18638] Rebooting in 86400 seconds..