0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) 14:08:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f00000002c0)=""/173, 0x32, 0xad, 0x1}, 0x20) [ 791.964564][T28310] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f00000002c0)=""/173, 0x2a, 0xad, 0x1}, 0x20) 14:08:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00') 14:08:45 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x5421, 0x0) 14:08:45 executing program 1: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) read$eventfd(r0, 0x0, 0x0) [ 792.625217][T28343] loop2: detected capacity change from 0 to 4096 [ 792.701623][T28343] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:08:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="cf010028bd7000fddbdf25"], 0x20}}, 0x0) [ 792.857370][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:08:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464", 0x39}], 0x1}, 0x0) 14:08:46 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) 14:08:46 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:46 executing program 4: socket(0x1d, 0x3, 0x1) [ 793.071804][T28365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 14:08:46 executing program 4: r0 = socket(0x25, 0x5, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) [ 793.232592][T28376] loop2: detected capacity change from 0 to 4096 14:08:46 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:46 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01ea27bd7000fddbdf2520"], 0x20}}, 0x0) 14:08:46 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) [ 793.525233][T28390] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 793.567202][T28394] loop2: detected capacity change from 0 to 4096 [ 793.669617][T28394] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000060, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) 14:08:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 14:08:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464", 0x39}], 0x1}, 0x0) 14:08:47 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:47 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) 14:08:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 14:08:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20040064, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 794.114188][T28423] loop2: detected capacity change from 0 to 4096 [ 794.131474][ T149] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 794.173417][T28423] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1a, 0x0, &(0x7f0000000080)) 14:08:47 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}]}, 0x1c}}, 0x0) 14:08:47 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:08:48 executing program 1: r0 = socket(0x11, 0x2, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) [ 794.878614][T28451] loop2: detected capacity change from 0 to 4096 14:08:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 794.918839][T28451] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464", 0x39}], 0x1}, 0x0) 14:08:48 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:48 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) 14:08:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000fddbdf2509"], 0x20}}, 0x0) [ 795.238382][T28476] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 795.242074][T28472] loop2: detected capacity change from 0 to 4096 14:08:48 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000000c0), 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0x40000000, 0x0, "00017e90104a81adce748df2fa04cbc774a08701edccae55aaa8f59523d98892"}) 14:08:48 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:49 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:49 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x89a0, &(0x7f0000000000)={@local}) 14:08:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 795.931987][T28494] loop2: detected capacity change from 0 to 4096 14:08:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6", 0x43}], 0x1}, 0x0) 14:08:49 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) [ 796.036409][T28494] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 14:08:49 executing program 4: prctl$PR_CAPBSET_READ(0x2f, 0x0) 14:08:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 14:08:49 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0xc4c85512, &(0x7f0000000080)=""/143) 14:08:49 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 14:08:50 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) 14:08:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x30}}, 0x0) [ 796.800863][T28531] loop2: detected capacity change from 0 to 4096 [ 796.910288][T28531] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:50 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x335bc0}], 0x4, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) 14:08:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6", 0x43}], 0x1}, 0x0) 14:08:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x24}}, 0x0) 14:08:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5421, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @multicast1}}) 14:08:50 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000700)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {0x24}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x1c}}, 0x0) 14:08:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x2a}}, 0x14}}, 0x0) [ 797.361471][T28563] loop2: detected capacity change from 0 to 4096 14:08:50 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) [ 797.420900][T28563] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 797.601097][T28571] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1137: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters 14:08:51 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:51 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x3, 0x0, 0x4a6a, 0x0, 0x0, 0xfffffffd, 0x6, 0x7, 0x7, 0x3ff, 0x0, 0x10001, 0x6, 0x5, 0x7, 0x6, 0x3, 0xaf2, 0x1, 0x4, 0xffff, 0x9, 0x4, 0xffffff23, 0xadb, 0x80000000, 0x2, 0x46ae, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x98, 0x400, 0x1, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 14:08:51 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) 14:08:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000280), 0x4) 14:08:51 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000023c0)=[{{&(0x7f0000001440)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001940)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) 14:08:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6", 0x43}], 0x1}, 0x0) [ 798.096352][T28585] loop2: detected capacity change from 0 to 4096 [ 798.097474][T28584] input: syz0 as /devices/virtual/input/input80 14:08:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x2}) [ 798.165105][T28585] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 798.178890][T28598] input: syz0 as /devices/virtual/input/input81 14:08:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x3fffffd, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:08:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x2b}}, 0x14}}, 0x0) 14:08:51 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) 14:08:51 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:51 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) 14:08:51 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) dup3(r0, r1, 0x0) 14:08:51 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010100000000000000003100000005003300050000000a00010077"], 0x40}}, 0x0) [ 798.596145][T28626] loop2: detected capacity change from 0 to 4096 [ 798.610872][ T159] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 798.671986][T28626] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 798.737227][T28639] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 14:08:52 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) 14:08:52 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x0) 14:08:52 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8981, 0x0) 14:08:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f", 0x48}], 0x1}, 0x0) 14:08:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010100000000000000003100000005003300050000000a00010077"], 0x40}}, 0x0) 14:08:52 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:52 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000017c0)=[@hopopts={{0x18}}, @hopopts_2292={{0x18}}], 0x30}}], 0x1, 0x0) 14:08:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x3fffffd, 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 799.166626][T28655] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 799.188500][T28656] loop2: detected capacity change from 0 to 4096 14:08:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010028bd7000fddbdf251f"], 0x20}}, 0x0) 14:08:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x3fffffd, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a7ae97fe232bcca079d131cd658af8645a2d835cec137d853b85bfa5d437cf1d"}}) [ 799.238179][T28656] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 799.260205][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:08:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010100000000000000003100000005003300050000000a00010077"], 0x40}}, 0x0) [ 799.413035][T28674] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 14:08:52 executing program 1: r0 = socket(0x10, 0x2, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) [ 799.519306][T28678] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 14:08:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:53 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x4}}}]}, 0x38}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:08:53 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010100000000000000003100000005003300050000000a00010077"], 0x40}}, 0x0) [ 800.007461][T28691] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 14:08:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f", 0x48}], 0x1}, 0x0) 14:08:53 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x0, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:08:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:53 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x4}}}]}, 0x38}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 800.245559][T28701] loop2: detected capacity change from 0 to 4096 14:08:53 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 800.307287][T28701] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:53 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0xffffffff, &(0x7f0000000000)) 14:08:53 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x101c1, 0x0) 14:08:53 executing program 0: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:08:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000180)={0x0, 0x8, 0xfff, 0x41fd, 0x4, "522035de5fdc1c30dd8c1fb8754ef7c044d5c8"}) pipe2(0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 14:08:54 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x0, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1e000000", @ANYRES16=r1, @ANYBLOB="010000000000000000003100000005"], 0x28}}, 0x0) [ 800.829852][T28732] loop2: detected capacity change from 0 to 4096 [ 800.913208][T28732] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f", 0x48}], 0x1}, 0x0) 14:08:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000180)={0x0, 0x8, 0xfff, 0x41fd, 0x4, "522035de5fdc1c30dd8c1fb8754ef7c044d5c8"}) pipe2(0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 14:08:54 executing program 4: pipe(&(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) 14:08:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001cc0)={&(0x7f0000001b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000001bc0)=""/238, 0x3a, 0xee, 0x1}, 0x20) 14:08:54 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x0, @perf_config_ext={0x1, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:54 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080), 0x8) [ 801.418994][T28763] loop2: detected capacity change from 0 to 4096 14:08:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1ff, 0x8, 0x1a0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 14:08:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) [ 801.468169][T28763] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:55 executing program 0: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:08:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000180)={0x0, 0x8, 0xfff, 0x41fd, 0x4, "522035de5fdc1c30dd8c1fb8754ef7c044d5c8"}) pipe2(0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 14:08:55 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x0, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1600bd7a, 0x0, 0x0) [ 801.986243][T28787] loop2: detected capacity change from 0 to 4096 [ 802.025253][T28787] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b8", 0x4a}], 0x1}, 0x0) 14:08:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000180)={0x0, 0x8, 0xfff, 0x41fd, 0x4, "522035de5fdc1c30dd8c1fb8754ef7c044d5c8"}) pipe2(0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 14:08:55 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='lock_acquire\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x40, 0x1, 0x4, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFULA_CFG_MODE={0xa}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x2}}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0x3, 0x2}}]}, 0x40}, 0x1, 0x0, 0x0, 0x6028804}, 0x0) 14:08:55 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x3, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x6}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:55 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x0, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9a, &(0x7f0000000200)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:55 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 802.373229][T28809] loop2: detected capacity change from 0 to 4096 14:08:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, 0x0, 0x0) [ 802.434124][T28809] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:56 executing program 0: r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:08:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x0, 0x1515}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x4, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_INFO(r0, 0x28, 0x481, 0x0, 0x0) [ 802.876617][T28836] loop2: detected capacity change from 0 to 4096 [ 802.897946][T28836] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b8", 0x4a}], 0x1}, 0x0) 14:08:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000022c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']-%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "7044a9797d8cab96071638527dd16f25acebd0ccc8bb7642c8d9bd4b1d1e9e52cc2f69b1baed8bc8b42a3224e8bfcfdd33c7da3524372027fb"}, @ETHTOOL_A_BITSET_VALUE={0xd5, 0x4, "f3260aa84450ac08117ff841607888320067a73c8b0388d079c0254738ee5a8de7c78ac59da80670f0b0f16aefa9b6cdfa990c0bff421e607cb91152ebd606c5e1288679bf2f966cca61bd4d40f08cac18b3b252718578a8e697b8af2844ce78b7c9ce13129daeafa3f485d76c9df4e25a94bbaa377d240cfee58e4ab29bafc94f86d468e4b1ee8523dd3a03f7c913437350835ea4f34d465cb1dd9f188d2781451916e854484498f342b902111d52d50eac6b6a84c012d48d3a1627799422d006861d3c328e9c8c75c87a315ce9d46c46"}, @ETHTOOL_A_BITSET_MASK={0xd35, 0x5, "6d8e54559d71ba0ea6dba15570304f7e771d7547621350e00baf42ba1ee452769dfbfc07eae205d70bcee3ca9509bbb31ce64b90203f743aa21344f97b51616e507a29eee591df09e775be42cff7c90d66422fa51f2235ad608069f53e32339e407702aefff6d53235fb02af4a8f65bb2b5f67fad516238f3823f1f6026dd483d719728a1f20c8e39b5fae569b817b31e4967c7ddfa89377f20b258d6bae82eb7f4e6780cf62f1d89dfeaa86584ed919ed4f9997db803573db6eff5cb62e27df8cafb2943031b820d052de5cc8f5720f026cd0ddab74afc75d70bdada3b3928ab1d285cda0c7c71175770bef830492f6dbf9e3fd78e00c3397cc463e1c45dab006b32fc0d572d66523c6e9f37fc239824e8ea5264bd1064dde2d4d0363849b3cef8234a07509c7c7a6cf3a99149ac26d8583d2eed3fcdf8f48ea63b87360219d2a557a32fcdd71e61becf356474cfe0dc462358d49800b54810ad571d8cd755e374e3994d59abb37cac80437249075353f0b8c56dfbb86c7b29e394663956f79cdb899d83f7e8fa11be3baf90d3bbf5155463e1e76f0ed909f12a1763058cd984f83e849ac485a4e657ed4dab79ed26aab4e2b9a47a9971510be25a5e43df3101684b75b2aa0613879b5404eda27810bd38ff5f368695aa73242a6c7d21229242c55d8a436cf6ee76734b279a8f26232c0a594a652469da4588c924d04ebeb573b811ac0663bfb560abdb04f22287fea6b9894efd545e1b66f835d72d09507008d3d89342d9e8726cbecdcefaa94df1cbc76c213a2e87a61cad09fe46b8e3c2c9e501900813df8f7b4b429ec7a79bdc0352643d7b0cc81344c04c54898be356b9c19b7d2ff038fb12f226045a1284ced7cac959ca7267ac6e70d83221b760713313c137638e49292959568ce4f1f488b5f1948ba17b4b831b460dd354a6ea910cc7e3523b055f9d4055d54706ef96533db7e28086ce1f6bbcece74120cea3c13e1adfc2b911ddccd11126e70354af81e707e7f8c714e309a5c6bac42bbafab5925461a1514304cf506e09941494d430ebba9d2b84cca4760f28cc21d282adde18127256309431f3ba30213ea9cde05d8a7d519f6409caed6c40a1a667d49080c9a1d2dc5208e66b1094edf256843a4096d5e1a34a8dc66e597899a80a33d1f90ef424362da69faf0d8d6bf23e9fe851725824d92e18e7090c4fbf345325529c47365e6184a8631a4fa36f7450bd14084fa413f02a305506ede7d26c4ca3c653c6fb04d0aa66fed219621a697bddee38c97032be7731874da7cf84edc2e71bc72e1d94b4597889bd41ea7b62482487c6e72010c7ea4bba97bdfdbce2c3ee3589c821413fda22719c083d20598a282207c1f6d03dce717e48e6b4a59d106a4c3c5d70a56bf0b00ef4b7d1764b97d7b01009f6365900501c0ec08a857ca9a17e69391a3f27f00a618acdec76779bbfa948930adc26d0ca1592ffac9a8f8288fef1b5d5e304397a2d5288c0458f58eff55dc9c8f11952e7a3598f4af16b2389268d15f4502510417c4cd1949034272056fe03583e895a9780e527d6b23c40ed455c0984042b4cedce47a4e744b156eb23f955d0855bc5e2b3da12757a9c7da12d1cec183766ca12b2b1c5bbb6cd158a95921b231c4eff321d0b7f135061226f90a81dcb004ac246c10298fa5e5c955ec31f29924b1fc1119bce8d8e4ef4ee3b8b319872ad30b82346dd99e3f2170558bd0d54817b1ba241dee00cd07f5210ea99551b832e43cc179a97a24d318a8f14e2f22df20c46d73c331a4ab5a4cae28278bcd7fd58715e6ffd6c6495c19c5c4004bc112baac5e60f762e67b53d97364f80e76362cd9538be86e6a426839dd4220ae609addeba292c73c3193384714a439597a22b7a525c57b703c788ef15f007ca1237a31fd4f1b4b77b65adb672b6d50e7f1085be7f2d9c8b4b1559055bfa313adfc96b23682507db3a98569dbc95f76bfdab28acd764ac4dd46ef067d110b7f1c3e2cdcb81f490710c3a6f53b0f0e773a4963f6949e58ed11a98db058ef10ab1030042a43e53b94fcd52582eb171e7fb1a5587f3dfb8342bdb61ed029fa1f233cae5ac62d7710d3a34c56c403ebacbac73f8695225729113e8422749eb2fff2362c54e41a58553553267272b04719adc111fc2a655cf50f98504b617ecff6a495fece8b532cd18f7bb5a1188958a91c9ccdd625b84f857ab8e5b981eb7cf584752de33a09c06b7077d9b49c3a3f8106e6856af09cf6a28212b948f7f1c48fa53af9de8748ab26866778e4d0588b77e60f32c76db1fef634f8567ec155222502d9179ecac9f39333f8ae7afe897e4f922f0b5bc7f6ce2525a540adde5e6ac9b4535b69c41ffcf0805cd1f606b9b5a373507b842f2dbc360dd5290da938ae157e576fcd4c8b3d1767408e14b17466c4666ca97046de11c1200f4b4a709859ca5e140eadad3c9b26c0e4e40ec797030df1f2fe31d133cea23ceffe08c3955b9406dc7a714a851678fac82fba2887c5ab0a7313dd59913ec5655fe2cb583b05344b9f5a35ad267675b2f771343baf6187aabd1c28a296d6603f6919f4c288dfe379f2e5e587e0dc6c747a86ecaea2fa258bd62d60c876ca3914ea9badcd442c8eb129c5a62f5e10bad426bd1495a619ec1b72b9ce659d2eaafc4cb1d5fe951c8bc2a822ed73cb11f6581a74a95735ba1b34780f44771d55dc019d3a17b4dbcb9efdf3c9e84669889561573978f4f202a3222f75120ee9e57861bcd560e766ba324597cbad827f4908aec42f0574d4a5fefd6f60cbb43e6505cc18961f6a70177a7162035ba7c92f8e75c995b42639f7d08938c7997b23875f0307d3eb8cd9a3822a301fdae9f07dd6b2ff96f343d3a4d3ce4f407005e9dd0389a456e012179771bc3a783d203eccd3c23a8465b6705a84e5f0f7da73a9aab9326916415d36cf85c45818e35519a7a9048bc0def8ae3599abb9787b08de09edabf89dfb8b60a2ec5cb82b127a21cb008d3b5d0e5d145ed94fc225ef0b8b541f5224721e93659cbe8119414522926fbe26b2eec95f563e3928907e47a5c3518bae3ed4f595d32b3f90615c4a4d3789c553db52d652f45dd284835eba853c0b0aa81aa0316ab981a8dd1b0dfd5ab9106be0daa1a5b873dda142775e385f81767d010442f05b97faa7d8150e2a95a8d298fe7b9294a8e8bfaaaa7cbdca5175ee5533b57673129003ac23e4a28bb9771407bcd5fddaa4427d17d3a6b54f08a6278aacdc0d3f2cf2e9222b3e1c8cfc4301444418b8075479dcfddd66aabf1b3200ece20d85f5fd103ab899f49da5170ecf6a9d1777ddd96144c178c289e91724bce3990293847454423b75252bc3001e5704b6dab2c582510cac606f9684a3b9e6315f6f06b64a6348a979aaf8d31682010616c459aecef5ec467c9e41e3dbf8f3ae283fa7b1523e3ab82b0e750627812fc506352b82978ff9b615bec224c017719db0ef88201b7e820ffb49298d1895f7e031662f36d784a59d1a97ea739b89640db791afa03bd5ff9f496464d2047077cf9875ae992616b22e20e8598648ea84d336389347707486bd9d73650433da0b50ac6d2e6b65153325db99f7b0749ef075c39135e5405e74c2ae9e5438ce51aed54fdbe28114d1f1e6928b0ad1cb6149cd5dda3723786cf44d60e0c252884ac075b577c1ab2ff5e0c4f0608d18c89e6dd372710204b77de36ef2979c73da94fa6fe32ff6d7571827118bb59630acde22e0a80cbbc5dd1ac2c9e6d8acb7c26f8ca86ce4d5bd26a4e82e9970846b7cc13c336f2c05b7e49e7bb09e958296fd83a1f739e81e9f5f87d7e572a48a7de5316edbbea330b7e33a7b556f40d03d458c18fed90efde6357a58d2d1213935196db54905a385c29b744327b65cdc0c050a478bbfa65b0ef6790e2730c8ac0a9556fc260e6c6a436d515543907c32a6bed1afd8ae890fe53bcd460b40fc2eea413fe5b36b4d9e9925e7bd1141e996526a8509d04f6537ee581d00b63a0cd7b3b945ceafda92cc3e180f79c9fba1b59f799df94748f06fdf0b38169eca1eab14c7779ff42a2cebd43b32a104a992eb4690dda52aa96f4ba7463594b614a7e6a519011fa64cf06f22ca403b524fa8429274ad2366f961140f3fb917a02f9197c8e9c25b6fb6f1dad3ce615c812237159b794c2bd94ae70adf18285ff373287f99baba663bf9cd6c92f3a1c34d0b9d678a9b3c3624b57169b308f0e6dbc505c473f62cbd786ee0c448497e23d17cc9f550b81a73cc0e5e5153b788bac0c5f73fb805f8b86fca6657ad4d30323a36a5ced38bc51b035c39ef02d266076a0253a0f2be2f6f60c837a92b64bddc41546a894780382016199a83761ecb84d8a82b5d32dccf92c161ff0572c357bd491b9fdedb2431146624882bf254cb3e99b15427fe89fe712f80db37df5392f5b4123022dfeed3c84c61599850e96f587d9da04360e4805269bbde548b06bbf7425568dfb5f6c8d76f822e7184f4bb27cedd59790df4bd7b804130848c7c33077881f1e32013a93811e7789c09c8af254ce2b04fde39e7209e4b4debc25cfb96518a109c592eb5294a6af0a5c4ab1bb34e02a1ce1469bd1ddf31713646cdcbb9cdb472bc87e383d5295d439eebec31acbd4200357211f44de2f9131536f232395955488e3d3ba6f0f258e905b6342416a5dfc023b305f9a0daa78cf1d23c4ebc76abd390e67fd72e486fc61edea5bd8fae638ea0a2b4368225b99f5c1fea61f23a34843863"}]}]}, 0xec4}}, 0x0) 14:08:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000040)=""/143, 0x26, 0x8f, 0x1}, 0x20) 14:08:56 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$int_out(r0, 0xc0045878, 0x0) 14:08:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0xc, 0x6, 0xbf710287f57d7ca7, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) [ 803.279382][T28856] loop2: detected capacity change from 0 to 4096 14:08:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x9a, &(0x7f0000000200)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:56 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000100)="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", 0xfb5, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) [ 803.384969][T28856] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:57 executing program 3: pipe(&(0x7f0000001000)={0xffffffffffffffff}) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 14:08:57 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x0) [ 803.812027][T28884] loop2: detected capacity change from 0 to 4096 [ 803.884800][T28884] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b8", 0x4a}], 0x1}, 0x0) 14:08:57 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xb, 0x0, 0x0, 0x1000000}, 0x39) 14:08:57 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private0, 0x0, 0x1}, 0x20) 14:08:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x6, 0xfff) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@empty, @local, @local, 0x2, 0x4, 0x0, 0x400, 0x7, 0x4010100, r2}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x19, 0x0, &(0x7f0000000080)) 14:08:57 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1}, 0x400, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) [ 804.371308][ T159] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:08:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x58, 0x1, 0x2, 0x5, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) [ 804.452541][T28906] loop2: detected capacity change from 0 to 4096 14:08:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000280)) [ 804.547161][T28906] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:57 executing program 4: r0 = socket(0x2, 0xa, 0x0) r1 = socket(0x2, 0xa, 0x0) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$caif(r2, &(0x7f0000000b80)=@util={0x25, "cfa853e93fd36ef598bbb569dbab3b0a"}, 0x18) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x4, 0x2d, 0x2, 0x4, 0x8, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80d0, 0x80, 0x40, 0xbca}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0xfffffff7, 0x40, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x700, 0x8, 0x8, 0x7ff}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000340)={'tunl0\x00', &(0x7f0000000300)={'syztnl0\x00', 0x0, 0x700, 0x80, 0x2, 0x7ff, {{0x5, 0x4, 0x1, 0x1, 0x14, 0x68, 0x0, 0x40, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x37}, @loopback}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000800)={'syztnl2\x00', &(0x7f00000007c0)={'syztnl0\x00', r5, 0x1, 0x700, 0x7f, 0x6, {{0x6, 0x4, 0x1, 0x0, 0x18, 0x66, 0x0, 0x1b, 0x2f, 0x0, @broadcast, @private=0xa010102, {[@end]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000880)={&(0x7f0000000080), 0xc, &(0x7f0000000840)={&(0x7f0000000bc0)={0x78c, r3, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_OURS={0x3cc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xf3, 0x5, "514675f2d4435f4704f9bc434942b4c5b32c9ee27c0f6439a515eef4e9190c30fbebbc41b685c0078c6bea4a4e924f34e080a56c18152b106df9519c7d66e6dce3482e024a533c41e82130f7a732a8f3f3cd3d04ba174a3c766d73a693fd3b4da9b004b62b108ffdb864a3e44aa89ef0b1b98776e980af1519cc075bad07fe735326219285a2c8528ebe4d331f169070ad766a9aae17a0737a3ae62b88fc1c2e4cd224605414f987c76171fdda1ff299df5bb0243bc37e29475d833eb8f839492357dd61cfe75fe99766507aabad502807aa9e1a3fae9f70fde08a8e82b8c6fce6b9d25da7f113a512612ff6099892"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x72, 0x4, "855425fd6c839b26b08adf776f2ecde7aa2b48145b6bf80716bb0852190519ce7f7cff147fa25d143e8a103891601363795290abfab2ced2f95bb8117e29cc367adfbc4b03819488550bd85d9e0a1ac04a19bfd547be4d7e51d5899862080d804cb1876d28d5d96b8078dbb5b0cc"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'wg2\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'vxcan1\x00'}]}, {0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'vlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-/${\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '&-$&!\'\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x14c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8d4c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '@+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x463}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'tunl0\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x4f, 0x5, "fb6d3b2b647c14c4c7ddca043693aceccad3c215f7ddf7dbf5e18a1d43e1de023a64c0da5f6c058ddac8385f4b03105c391feb90ac8a7bebb9b5bd8db834b799f7dbc07cf925356993cb7a"}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x2}, @ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKMODES_OURS={0x100, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4a, 0x4, "a0fa7629ece60d7b042e5fdbf5e52c12374f0cad62e0aa199cde7e82f07f09a7469a0d550a223a2a99505c370c17a009c216dfd95539f0f0937806fa3f3b739fa3c320e655ec"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xac, 0x5, "d4a04407e8c72c750f1ee9d378e828cd1c85f98c0fe4d198b5d6582b44e708ad61fc57d1e8e3c9d8a76fb60f00436f9fb9504d02ba49e92e9d2a8c60538693b1b948e7da4c2de19a0917db7e4a7dd4d8535f358bb933d39bbab9d2b2559b0fe9cdefe3aff789f5220b9aee2c7207ae6e3927e954be6ae9ed32b422947d167c793d7383524d1098eba1ef37ff77bd8fd4f3931c0d28fcf82764bb135a5169b84ca6ac35596396e3bb"}]}, @ETHTOOL_A_LINKMODES_OURS={0x280, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x8c, 0x5, "eaacedf4c19809eac34d0bd2aa0e7b19b87412409802cfde496f3083c051acabba9559d4432e52ec67e9f42bd3358326e47982cd0f2b25dbc81dbba443450b9980ba133ae7ca5a49711fee795c527ed394aed07d812d4064ad3ecef3faa7cdc4ced894dbf1f59862e19aae8ac1db688066c73b494ead799d36f5481d9b5a4ec72a93fedaa6d08265"}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffe}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'wg2\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'tunl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\$(\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'tunl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/!!$/#!(\'^\'%,\'\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa705}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xa, 0x4, "1d6acef352ea"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0xe6, 0x5, "d02a4f9184351e41bc41adc033070f101d38afb7c389e6da8df80f6c166ce2e95d99730c63e29b614d08c2c9350c9cc163f8ba53197f8c8ca27c0860d14d77862ad5d9e368d03275fc59feca8f6222827d80715c988d7f7319a0e8cd7a141e6de611556ec0a78a77a7a101c9512eab8c09ad132564c6e829584b83e88f71b2ffbf503dd1df296d6c8730c4685e4476b97a8475dc272ffba9fa62d99a07ecd7776c5447819be4c4731e62f10061d8753228555cdba7684e2c4d08420c363ffa40b1cddc8cfd5308f164f2e31c2dcd28c3a5368c38629c506c038a14f8cbf7f3ce2f30"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x81}, @ETHTOOL_A_BITSET_VALUE={0x6, 0x4, '\\k'}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x5}]}, 0x78c}, 0x1, 0x0, 0x0, 0xc0}, 0x44000) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x20, 0x8, 0x8, 0x1, {{0xe, 0x4, 0x0, 0x7, 0x38, 0x66, 0x0, 0x1, 0x2f, 0x0, @local, @empty, {[@cipso={0x86, 0x16, 0xfffffffffffffffc, [{0x5, 0x10, "e58095d75a9d29fdd02a683df393"}]}, @ra={0x94, 0x4}, @generic={0x83, 0x8, "75d49987de80"}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x2f, 0xa8, 0x20, 0x10001, 0x6, @empty, @empty, 0x700, 0x8, 0x5, 0x5}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000500)={0x1f4, r3, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x64, 0x2, 'gretap0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x880}, 0x84) ioctl$sock_SIOCDELRT(r0, 0x8901, &(0x7f00000000c0)={0x0, @in={0x2, 0x0, @local}, @phonet, @xdp={0x2c, 0x4, r6, 0x3e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 14:08:58 executing program 3: pipe(&(0x7f0000000400)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xd6, &(0x7f00000001c0)=""/214, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480), 0x10}, 0x78) 14:08:58 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f0000000d80), 0xffffffffffffffff) 14:08:58 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) [ 805.009854][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 805.211711][T28947] loop2: detected capacity change from 0 to 4096 14:08:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b844", 0x4b}], 0x1}, 0x0) 14:08:58 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:08:58 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x15, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000100)=""/142, 0x18, 0x8e, 0x1}, 0x20) [ 805.319006][T28947] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:08:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}]}, 0x1c}}, 0x0) 14:08:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 14:08:58 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xc, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:08:59 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x24) 14:08:59 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 14:08:59 executing program 1: add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) fork() [ 805.818852][T28978] loop2: detected capacity change from 0 to 4096 [ 805.884401][T28978] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 805.926250][T28987] device wlan1 entered promiscuous mode 14:08:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b844", 0x4b}], 0x1}, 0x0) 14:08:59 executing program 3: clock_getres(0x0, 0x0) clock_gettime(0x0, 0x0) creat(0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000240), 0x0, 0x0) 14:08:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0x7, 0x4) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) accept4$rose(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:08:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 14:08:59 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x0, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:08:59 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 806.524463][T29005] loop2: detected capacity change from 0 to 4096 [ 806.535205][T29004] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 806.626815][T29005] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 806.651933][ T6585] Bluetooth: hci6: sending frame failed (-49) 14:09:00 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x0, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) [ 807.169263][T29029] loop2: detected capacity change from 0 to 4096 14:09:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x12e, &(0x7f0000000200)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) [ 807.226020][T29029] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:00 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e37b00000000000000ca1b4e0906a6bd7c49d8413080b41b4da456331dbf64700169a1049b5464e64d275d5c3ef0381ad6e74703c48f93b844", 0x4b}], 0x1}, 0x0) 14:09:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@gettaction={0x24, 0x32, 0x1, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x7, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x24}}, 0x0) 14:09:00 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x0, 0x8001, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x12e, &(0x7f0000000200)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) [ 807.742456][T29058] loop2: detected capacity change from 0 to 4096 [ 807.754316][T29060] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 807.789191][T29058] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r1}, @IFLA_GRE_LOCAL={0x14, 0x6, @private2}]}}}]}, 0x54}}, 0x0) [ 808.210711][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.217134][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.688679][ T8358] Bluetooth: hci6: command 0x1003 tx timeout [ 808.694794][T29019] Bluetooth: hci6: sending frame failed (-49) [ 810.136041][ T149] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 810.768623][ T20] Bluetooth: hci6: command 0x1001 tx timeout [ 810.774726][T29019] Bluetooth: hci6: sending frame failed (-49) [ 810.782133][ T149] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 812.855262][ T8358] Bluetooth: hci6: command 0x1009 tx timeout [ 815.889073][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 816.543551][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:10 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) 14:09:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x127, &(0x7f0000000200)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 14:09:10 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x0, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000060, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:09:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={0x0, 0xec4}}, 0x0) [ 817.367359][T29095] loop2: detected capacity change from 0 to 4096 14:09:10 executing program 3: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000001b80)) 14:09:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x3, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @tcp}]}, 0x18}}, 0x0) [ 817.480482][T29095] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:10 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0xfffffffffffffffe, r0) 14:09:11 executing program 1: openat$nvram(0xffffffffffffff9c, 0x0, 0x256403, 0x0) 14:09:11 executing program 5: accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 14:09:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000060, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:09:11 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0xa5}) 14:09:11 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x0, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001700)=ANY=[], 0x1eb0}}, 0x0) 14:09:11 executing program 5: execve(0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x2002) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file1'}, 0xb) [ 817.996713][T29129] loop2: detected capacity change from 0 to 4096 [ 818.066870][T29129] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:11 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000016c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001680)={&(0x7f00000002c0)={0xec4, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe90, 0x3, 0x0, 0x1, [{0xe8c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xe85, 0x6, 0x1, 0x0, "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"}]}]}]}, 0xec4}}, 0x0) 14:09:11 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0) 14:09:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000060, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:09:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001700)={0xcbc, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xca8, 0x3, 0x0, 0x1, [{0xca4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY={0x8c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x83, 0x1, "d5358ceecb6069d41f0d8f04c6dcb7c4fcc28ddc6761a6efc73decbd48629fe37d6a67894e557d52964fcaf2af3a63b03accd4cd55f29e30df18c2a702901dfc18d5ffa50658e866f01e2f7c1aa6ed65cc52a01fba6c1de44e76c28b4a19d957303edb9b2489bca1425627b257b28260c2ddddd984d2739f46e0278435f71a"}, @NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPR]}]}]}, 0xcbc}}, 0x0) 14:09:11 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x0, 0x0, 0xdb6, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000005b00)) 14:09:11 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x80, 0x0) 14:09:11 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x101042, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfffffdc8) 14:09:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x56bd, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @empty}, 0x1c) [ 818.591609][T29162] loop2: detected capacity change from 0 to 4096 14:09:11 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x111041, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)=ANY=[], 0x8) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x1014) [ 818.662406][T29162] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:12 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0xffffffffffffffff}) 14:09:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:12 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000440), 0x802, 0x0) 14:09:12 executing program 3: getresuid(&(0x7f0000001580), 0x0, 0x0) 14:09:12 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0x0, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:12 executing program 4: r0 = msgget(0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xa8, r1, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x44, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x14, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1f}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x9}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x800}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x10000}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1f}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8}, @NL802154_ATTR_SEC_OUT_KEY_ID={0x34, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0x24, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x100000000}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) msgrcv(r0, &(0x7f0000000500)={0x0, ""/22}, 0x1e, 0x0, 0x1800) [ 819.361049][T29192] loop2: detected capacity change from 0 to 4096 14:09:12 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) [ 819.431806][T29192] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:12 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:12 executing program 3: syz_emit_ethernet(0x62, &(0x7f0000000380)={@random="71764ef01fa1", @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "1f67b9", 0x2c, 0x0, 0x0, @private0, @private0, {[@hopopts={0x0, 0x0, '\x00', [@enc_lim]}], "3a4a3ee36ddc517490a8a4e396d18525718a05021f738d67654b70ab"}}}}}, 0x0) [ 821.649077][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 822.288452][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x980}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:09:16 executing program 4: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x40100, 0x0) 14:09:16 executing program 3: msgsnd(0x0, &(0x7f0000000140), 0x8, 0x0) 14:09:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getpgrp(0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 14:09:16 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0x0, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:16 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 822.853773][T29230] loop2: detected capacity change from 0 to 4096 14:09:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174", 0xb}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 822.925218][T29230] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:16 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@random="b1ed7324d74d", @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "895e3e", 0x14, 0x6, 0x0, @dev, @dev, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:09:16 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 823.057982][ T26] audit: type=1804 audit(1628258956.344:42): pid=29241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547769672/syzkaller.kzKzid/869/cgroup.controllers" dev="sda1" ino=14162 res=1 errno=0 [ 823.078520][T29248] loop3: detected capacity change from 0 to 264192 [ 823.226197][T29248] FAT-fs (loop3): bogus number of reserved sectors [ 823.235766][T29248] FAT-fs (loop3): Can't find a valid FAT filesystem [ 823.437152][ T26] audit: type=1804 audit(1628258956.724:43): pid=29248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir270668686/syzkaller.U69j6v/705/file1/cgroup.controllers" dev="sda1" ino=14562 res=1 errno=0 14:09:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000200)) 14:09:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x30}, 0x0) [ 823.537449][T29248] loop3: detected capacity change from 0 to 264192 [ 823.648572][T29248] FAT-fs (loop3): bogus number of reserved sectors [ 823.655732][T29248] FAT-fs (loop3): Can't find a valid FAT filesystem [ 823.736141][ T26] audit: type=1800 audit(1628258957.024:44): pid=29256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=14163 res=0 errno=0 [ 823.825339][T29274] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 823.836568][ T26] audit: type=1804 audit(1628258957.074:45): pid=29247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir547769672/syzkaller.kzKzid/869/cgroup.controllers" dev="sda1" ino=14162 res=1 errno=0 14:09:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:17 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0x0, 0x499, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174", 0xb}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 14:09:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0xd, 0x0, 0x7, {[@generic={0x0, 0xf, "0da57cff66e883bd2bff0604a5"}, @end, @lsrr={0x83, 0x3}]}}}, @ip_retopts={{0x10}}], 0x38}, 0x800) 14:09:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x980}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:09:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x30}, 0x0) [ 824.024284][T29283] loop2: detected capacity change from 0 to 4096 [ 824.038955][T29285] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000035c0)='fdinfo\x00') openat$incfs(r0, &(0x7f0000002080)='.log\x00', 0x0, 0x0) [ 824.128233][T29283] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x30}, 0x0) [ 824.152428][ T26] audit: type=1804 audit(1628258957.444:46): pid=29281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547769672/syzkaller.kzKzid/870/cgroup.controllers" dev="sda1" ino=14610 res=1 errno=0 14:09:17 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, 0x0, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 824.327523][T29295] loop3: detected capacity change from 0 to 264192 14:09:17 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) [ 824.427264][T29302] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 824.452149][T29295] FAT-fs (loop3): bogus number of reserved sectors [ 824.458768][T29295] FAT-fs (loop3): Can't find a valid FAT filesystem 14:09:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, 0x0, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x30}, 0x0) [ 824.759427][T29314] loop2: detected capacity change from 0 to 4096 14:09:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') read$FUSE(r0, 0x0, 0x0) [ 824.802870][T29314] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 14:09:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, 0x0, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x980}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:09:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 14:09:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x24000400) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 14:09:18 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x0, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:18 executing program 3: socket(0x1, 0x0, 0x5cfe21ac) 14:09:18 executing program 4: add_key$user(0x0, 0x0, &(0x7f0000000140)="0e", 0x1, 0xfffffffffffffffd) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)) 14:09:18 executing program 5: clock_gettime(0x2, &(0x7f00000001c0)) [ 825.335536][T29348] loop2: detected capacity change from 0 to 4096 [ 825.399362][T29348] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 825.430198][ T26] audit: type=1804 audit(1628258958.724:47): pid=29343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547769672/syzkaller.kzKzid/871/cgroup.controllers" dev="sda1" ino=14595 res=1 errno=0 14:09:18 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e"], 0x40}}, 0x0) 14:09:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000082c0)=[{{&(0x7f0000000180)={0xa, 0x4e23, 0x0, @remote, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@tclass={{0x14}}], 0x18}}], 0x1, 0x0) 14:09:18 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='maps\x00') read$FUSE(r1, 0x0, 0x0) 14:09:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000014c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x34, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x980}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x34}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 14:09:19 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x0, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:19 executing program 5: add_key$user(&(0x7f0000000300), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 14:09:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@private0}) 14:09:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000004480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004440)={&(0x7f0000000280)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x414, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_NET_DETECT={0x2dc, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_SSIDS={0x58, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x9, 0x0, @random="3f8e97abc8"}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xd, 0x0, @random="7cc5e43648c07ce081"}, {0x11, 0x0, @random="eaa1332625d53fadb6bf7738ec"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x10, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac=@device_b}]}, @NL80211_ATTR_IE={0x1a9, 0x2a, [@random_vendor={0xdd, 0x72, "ebbef6defc434fbc3b48c2defd1f067318030e5e22beff352606d94cdcb872e9d06b483a2f77d7308b91f3a389dc49ff7b318e98ba2c665e5a0eb4f171f766eb993432fef1fe8091938829b1d0762ffbb9e2f715672d72d824912418453ad0aa5e3d425b2858ec3518d8c8367f97417cd3ee"}, @fast_bss_trans={0x37, 0x6e, {0x0, 0x1, "528264b8d940df2c4a5f71afeac2e972", "7bee84cca25da29f987df6dc49bc4fdaa8864c25b27c94e1fbf3c754a043833a", "3928e275277fc90c0b9492e4334d6eb9556941c78d58e52ce4d6247d9755c72a", [{0x0, 0x1a, "dd7197463980c5024b9c62eca68f5e9066337352eaab1922a27c"}]}}, @dsss={0x3, 0x1}, @ext_channel_switch={0x3c, 0x4}, @gcr_ga={0xbd, 0x6, @broadcast}, @peer_mgmt={0x75, 0x18, {0x0, 0x0, @val, @val, @val="ab7d7707b442ac6fa8c8079618d0863c"}}, @random_vendor={0xdd, 0x82, "ec6ba4f788fd826b985b98955d1117d0187fcb063cd53c63e01b9ac0e21ea1782732dd7f792ea0943f6a046020e9c279aa6003482ccaadb7b30520444cfe09ecc3d32f39e87ced3c4f28e728fcd334c87869bb705182996f16ddc61e49b0b7c7678f5056e8d25c66620a956ec39bc0043b99dcd5501e776c8d9d4f8fecd0d9e16a0d"}, @cf={0x4, 0x6}, @ext_channel_switch={0x3c, 0x4}, @ibss={0x6, 0x2}]}, @NL80211_ATTR_IE={0x85, 0x2a, [@mesh_chsw={0x76, 0x6}, @random={0x0, 0x4b, "2c4259aa80f99ef7a0c378cdb0a828917e750f370bdf548bd826568ed2971698ef59973c6ee6b086fb2be411ca7416ef8caf0a4867d10e29a32daf035bb775130b7f2d7c600a47f6a236c8"}, @prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, @device_b}}, @sec_chan_ofs={0x3e, 0x1}, @gcr_ga={0xbd, 0x6}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0x2c, 0x2c, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}]}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x12c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x6d, 0xa, "277390c3226d97002db430fb0622df92d3c17209921f75309bdbc3f77e61c4d9f552eb268b5c538a5fd867898eb24e28bf4168a1edced87db4ea09661ba300d89e0edb181ca692f08c601fe0ebf4d22bfd901e5ea960b5ac942c13c0991dfacc6d6a168293f8c15495"}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @broadcast}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x11, 0xa, "bb59b8e4d4d0eb28cfeded1bc5"}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @remote}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x61, 0x8, {0x0, 0x0, "6ba7efc06d959879cd6ba623899f9478a66ded2ac1c8eb2b29f6eea6fe7de1cc3b7d405657253b95c6dad1e6d1a4a2746fe06c16aee3e816860034ce241732f29466001b820414c61879b30198b7e696ba505ab8c0"}}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x1a8c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x16c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @multicast2}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x4d, 0x8, {0x0, 0x0, "c2688d1683f5bb6707b825b0c226666403307a57dc3dfd08c918a88fbe0c56bea578ea8f2d3cdab50eed0186230acb957baf47cbbc1d913f3238a0dba611df2825"}}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x81, 0x8, {0x0, 0x0, "ef33f716e3e5c9128be93edda52531a783bd1f36eb5dabca81967c6f78dd004adb944a5038a3ef301b81f8aaef454b3671ec90ddc6e311d3a5742315b6756ba5a73915c4a5e1f7f92042d7626802dd8f225fb7a8e46b095b18e14f5a89e514c8447a5513a5c5f8eb4fb3128b1c07188318571846b5"}}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0x71, 0xa, "e27e32fe83a11bbf813392f28ee17f8804bd884cf102c1158d8a9a8d93960267134e3daf72c0629dfb169e3cd7790dc0cfdb48d3ed8c69ac4947b5cd8c7a4793715d43500d02568041fc0a10d64e83baef6208e2e16aef4c3188591130abdb2f3c5a62f3f648e0db8eadfbdd9f"}]}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x191c, 0x4, 0x0, 0x1, [{0x35c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0xc1, 0x1, "3a4f7195d5ba1c45f160f90ae55147ccfb13f16f2f07395a843fe5c4485031a5d2547f61c0bbe74374552ff24516909f5282a43e65cb1c0ffc95268818b15315b850741927d71a71be8ca60ad434004ede405d674f1013c597c56cbb20564748a550c02629d614b32c6604893ad6b14ad84fe5f302b27f6e6703f4a71e6b65d97a75db7647300e71bf569527821f9a35957eb46606a85803e45446bd33f013ff083cc4689f8bbebc1b161af40722f19aa8169a172e2cc7f1b00b774933"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xf9, 0x1, "3c5ee0bd1ed009886f6bed5315ab7efdf16ac175a011b55bbd1fbb171807e7e4ea08be6983e9241de85c39d8ce053ac0527dc80f5ff129fa95ad785e8557c5b3b1e7589134fd62d09f3aadc700c20a0109f26277f49fa95f16988247aedcf1dfefb2281325d9ab4b15804f0b3edf479cb3aa1d1820eeac97d82d8dd458c0b98df92698789a095907e04dcea58ae789ae80478c1bcfc5c60046bcaea9528532e2318682f6e558d159d1d362526235045848c647c7c2f34c8d14b8b83b97974e87e6d2246420c27ea2fb029c1c793956c50f59ab342ad2ac509219a9fa27b42d1156d76aa5c7462ead1d74c3fb85fe623ad2ea039f7f"}, @NL80211_PKTPAT_MASK={0x45, 0x1, "1f041a0c80b377c8a260c9d0baeff943f0321ecb89509f9c03070b1186acd4483d708bd2ea497a5e99024dbfe1d0a5a3a27578800b267cd126d490a9bfd6d3e5a4"}, @NL80211_PKTPAT_PATTERN={0xe1, 0x2, "3b39fde8221725a8cc0c93402b2eec029141b3dea2912d09fccc1bd857761c6757a88b418187ce78363502109b8d584f803c9e415d602a99ebda243cf35b7b9e28fe13437f3ef13f888979c749982d4e54259ef94047d88adc2f56aa9339fb4bd7ff218585a172f1a3b6d8b48606e3b7a13f14ce2703549878c6a4aacb6b862c8e0f5c8aaade405449eb643f36463d8cf8dcf06088a9a7f1ad39a4a34fb613833ae671e85885651a7dfc75b6a79791cf9d5ae1da84784d355bafad1222cff6a232ab65d7443b6ccfa8a6f87e8fe8f7fba8d714201f65e27118de25c79c"}, @NL80211_PKTPAT_PATTERN={0x61, 0x2, "5744e0c45c3d78c89752e8051c561d64d9d5d8c7943c1d8e1b2254a89917849b21080a884b9e6b2f3b3ba727acf17123383d209bc449f120e94cbd0b1ab11ecbf5a6d887f9bd859acd162e1db365abfc98a0d65f1b200bce041141749d"}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8}]}, {0xb0, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0xa9, 0x2, "08479a95de39490c0b2d9af43715b908cc504fe282a68add992bbd62ec55951e324134df15794ec8e38b74d925e889177e36010ed6e58ad8afe146e500bc3e2e2e338e7a5cbaeb306b86d84a3b2c2d9601d8ea4d5f2efc399d7de9a0f72cb53dd7da833ab3f8735aea92e9eec0c01d8f80d2041e2f8dcaa3f409ba7a4ad316bc3cde1bc7dded7e72d1aac30398871f955b7ef90ed6b314e36d5f9817b23acae15f5ed33b01"}]}, {0x1288, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x1001, 0x2, "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"}, @NL80211_PKTPAT_PATTERN={0xc1, 0x2, "88e837fef36bc6ec86c017727981730ba3a8887aa19ecfca82c19343f67d994c220e1f2c37bb1b3542f2147e7b3439550e6c1e12a592d47e34e05eb04ead571255c5d0c3b06c14e92ce82e4a984733369e9481551a3ebc08a2b396d340d0aa73e245c88b71da4ce7c209ce1a9d9f2e97c6f3a66726b8a98d8c30bdb5ff1ef56b7c6f28d952f90af2ded09db7cdb6b79de7b64f08e89117fcf66bd4d5740a08071c585e1775cc0c2489c07b14137dcfef0fa565089e633b876443c69ca5"}, @NL80211_PKTPAT_MASK={0x15, 0x1, "57552e1177a0d1a1a4285eb04cf2a8ff45"}, @NL80211_PKTPAT_MASK={0xe5, 0x1, "328cacf572990a2640e916f9319d525547404a0e484111fa03d2cbf8d511ede2ce3c8c181f035af795bf172558774156ce5f1da77d33feb7667fdb08bba30b9447495f32bfa1f0401e50cf775c0f68a6e6c052ba4068cb04b45d2eae038c8a552289c9f7ccdc653a51a7f81db10e556b128a12ea488ef519ecae35d9517d6d2f6347983eb185e3bb6a04755e38ff8813c4bfed44d00fa07247270c5b43156b9e701d48f1fc93002131b338b7945a89ff374536b3ce406e1497e343fe6c8039c77acd496435a951f3ee65a826dfcaeaba8779c7116732379b07027b64667216aec2"}, @NL80211_PKTPAT_MASK={0x25, 0x1, "f85d72e92fed031d0de8203bc276f004f1fc51c0905a0b0fd29f5adac4ca25e65f"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_PATTERN={0x85, 0x2, "da38d4e1a6887b881277e8e717bc6fc2bb408dcda865da13c80a56325f8ab870d7941b41e6dd596670e514cedc6a2624d35ff9f331139aab80fee4997311f170b2209a4a1b225778a6ef73d1070440773170b01cc0929c302a33b6ce1ad313fa21468161e0d834f5f0c3f6efa26fea40c72c26828b348737f27bf506ad11e2fb63"}]}, {0x270, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x91, 0x2, "a0d7c62bb50f0e3992f6b0e8181644a936564a9bfc8392f0da2880102c2cb61880fab06cdde68bc38fb0f7075bbcb30bba64fa5b0ddaf3a312e7eec58433810fb6dd5a6286e2202eeaf20fb0281a27e94de36f997c11fa8ebc81e2e2c299088d4611a8f788ee63c256e222ddcad0b746ebacfe4de26ae3f35af72cc0e8702f62583e6a2a51e6e2d6371d2eedbe"}, @NL80211_PKTPAT_MASK={0x1d5, 0x1, "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"}]}]}]}]}, 0x1ec4}}, 0x0) [ 826.002552][T29383] loop2: detected capacity change from 0 to 4096 14:09:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x2, [{}, {}]}, 0x48) 14:09:19 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) fcntl$getflags(r0, 0x409) 14:09:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x668, 0x410, 0x410, 0x2e0, 0x0, 0x0, 0x598, 0x598, 0x598, 0x598, 0x598, 0x6, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @private}, @local, [], [], 'xfrm0\x00', 'macvlan0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@local, @ipv6=@loopback}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast1}, @private0, [], [], 'veth0\x00', 'macsec0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28}, {"4696"}}]}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xd0, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@multicast2}}}, {{@uncond, 0x0, 0x160, 0x188, 0x0, {}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @private0, @dev}}, @common=@icmp6={{0x28}, {0x0, "57b1"}}]}, @inet=@TOS={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c8) [ 826.091166][T29383] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:19 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:19 executing program 4: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) pkey_alloc(0x0, 0x0) 14:09:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000030c0)={0x2020}, 0x2020) [ 826.368725][T29406] x_tables: duplicate underflow at hook 1 [ 826.389669][ T26] audit: type=1804 audit(1628258959.684:48): pid=29393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir547769672/syzkaller.kzKzid/872/cgroup.controllers" dev="sda1" ino=14177 res=1 errno=0 14:09:20 executing program 1: add_key$user(0x0, 0x0, &(0x7f0000000100)="07dd0aa482c3964bf26a52d5b9a523f0a931f9631b802eb47eb94a711054f2c93ccee96d23eada7ecd2d53f73123d6fa170230c5a939eb5f933b0063bb85fca68c", 0x41, 0xfffffffffffffffc) io_setup(0x0, &(0x7f0000000140)) 14:09:20 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x0, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000b40)={@local}, 0x14) 14:09:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4e8, 0x328, 0x238, 0xffffffff, 0x0, 0x328, 0x418, 0x418, 0xffffffff, 0x418, 0x418, 0x5, 0x0, {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@unspec=@mac={{0x30}}, @common=@hl={{0x28}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@multicast2}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@private0, @gre_key, @icmp_id}}}, {{@ipv6={@local, @mcast2, [], [], 'veth0_virt_wifi\x00', 'wg2\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private2, @ipv6=@loopback, @gre_key, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) 14:09:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x4e8, 0xffffffff, 0x0, 0x0, 0x1f0, 0xffffffff, 0xffffffff, 0x418, 0x418, 0x418, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@ah={{0x30}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x200, 0x228, 0x0, {}, [@common=@inet=@policy={{0x158}, {[{@ipv6=@private0, [], @ipv6=@empty}, {@ipv4=@multicast2, [], @ipv4=@multicast2}, {@ipv4=@multicast2, [], @ipv4=@empty}, {@ipv6=@private2, [], @ipv4=@broadcast}]}}]}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) [ 826.794110][T29424] loop2: detected capacity change from 0 to 4096 [ 826.800670][T29426] x_tables: duplicate underflow at hook 2 [ 826.824907][T29427] x_tables: duplicate underflow at hook 1 14:09:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') read$FUSE(r0, 0x0, 0x0) 14:09:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 826.903490][T29424] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2, 0x0, 0x0, 0x0, 0x4, 0x1, 0x7ff}, 0x20) 14:09:20 executing program 4: creat(&(0x7f0000000040)='./file1\x00', 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) 14:09:20 executing program 5: r0 = epoll_create(0x2) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 827.010965][T29442] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 14:09:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r1, r0, 0x0) 14:09:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003f80)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@hopopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 14:09:20 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:20 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') read$FUSE(r0, &(0x7f0000002040)={0x2020}, 0x2020) 14:09:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) dup3(r1, r0, 0x0) 14:09:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 14:09:20 executing program 1: io_setup(0x8, &(0x7f0000000140)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) [ 827.408015][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 827.435640][T29460] loop2: detected capacity change from 0 to 4096 [ 827.485687][T29460] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000082c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0xfffffffffffffee3, &(0x7f0000001480)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) 14:09:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') read$FUSE(r0, 0x0, 0x0) 14:09:20 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps_rollup\x00') read$FUSE(r0, 0x0, 0x0) 14:09:20 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='children\x00') 14:09:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000100)=0x9d, 0x4) 14:09:21 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:21 executing program 3: add_key$user(&(0x7f00000000c0), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d0", 0x1, 0xfffffffffffffffc) 14:09:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x14, 0x0, 0x7, {[@noop, @rr={0x7, 0x3, 0x72}]}}}], 0x18}, 0x0) 14:09:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000082c0)=[{{&(0x7f0000000180)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="18"], 0x18}}], 0x1, 0x0) [ 828.048211][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@local, @private0, @private0, 0x0, 0x8000}) [ 828.094349][T29495] loop2: detected capacity change from 0 to 4096 14:09:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x18}}], 0x1, 0x0) 14:09:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000540)={0x11, 0x17, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) [ 828.199875][T29495] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x8) 14:09:21 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0xffffffffffffff4e) 14:09:21 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) 14:09:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) 14:09:21 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) [ 828.617545][T29528] loop2: detected capacity change from 0 to 4096 14:09:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001f80), 0x40) [ 828.737622][T29528] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3, 0x72}]}}}], 0x18}, 0x0) 14:09:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), 0x4) 14:09:22 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') read$FUSE(r0, 0x0, 0x0) 14:09:22 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001840)=[{{&(0x7f0000001700)={0xa, 0x4e20, 0x0, @mcast1, 0x101}, 0x1c, 0x0}}], 0x1, 0x0) 14:09:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback, 0x10000}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x1c, 0x0}}], 0x2, 0x0) 14:09:22 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$snapshot(r0, 0x0, 0x0) 14:09:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 14:09:22 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{0x0}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:22 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) [ 829.211176][T29565] loop2: detected capacity change from 0 to 4096 [ 829.294504][T29565] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:22 executing program 1: clone3(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:09:22 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, 0x0) 14:09:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) bind$inet(0xffffffffffffffff, &(0x7f0000003200)={0x2, 0x4e24, @remote}, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)={0xc0, r2, 0x100, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x48, 0x45, "8b9762e862d923b59dafe5491a13e3bd65b6e1719641bdbee48085631f6449448529015ab59f8dca5359785aad2cfca110e16be942230e00171de2047dbe491d2fa6ccd3"}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x47, 0x45, "c512358981222c5c99aad9984edb30d5631aad6fc6dc659e787a683e5f5f47f2c2615eb706ab051350bd8ea1e19efa7d229f212d02a5d163d00434754ece30c3d48a6b"}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x20000040) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}]}, 0x1c}}, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'veth0_macvtap\x00', 0x20}) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYBLOB="f311b522fdaf98aea09be7d5d6f65a94a49ee1f40173476fe7d38500", @ANYRESOCT, @ANYBLOB], 0xfc30) 14:09:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'bond_slave_0\x00', {0x3}, 0x2860}) prctl$PR_SET_FPEXC(0xc, 0x0) 14:09:22 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{0x0}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:23 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:23 executing program 4: clone3(&(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:09:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x1279, 0x0) 14:09:23 executing program 3: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040), 0x101040, 0x0) [ 829.921932][T29607] loop2: detected capacity change from 0 to 4096 14:09:23 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{0x0}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:23 executing program 4: r0 = socket(0x11, 0xa, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 830.022020][T29607] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'wlan1\x00', {}, 0x663}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) clone3(&(0x7f0000000340)={0x0, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x39}, &(0x7f0000000100)=""/228, 0xe4, &(0x7f0000000200)=""/209, &(0x7f0000000300)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) pidfd_open(r2, 0x0) 14:09:23 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000480)={'geneve1\x00', {0x2, 0x0, @multicast1}}) 14:09:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) bind$inet(0xffffffffffffffff, &(0x7f0000003200)={0x2, 0x4e24, @remote}, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)={0xc0, r2, 0x100, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x48, 0x45, "8b9762e862d923b59dafe5491a13e3bd65b6e1719641bdbee48085631f6449448529015ab59f8dca5359785aad2cfca110e16be942230e00171de2047dbe491d2fa6ccd3"}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x47, 0x45, "c512358981222c5c99aad9984edb30d5631aad6fc6dc659e787a683e5f5f47f2c2615eb706ab051350bd8ea1e19efa7d229f212d02a5d163d00434754ece30c3d48a6b"}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0x4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x20000040) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}]}, 0x1c}}, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'veth0_macvtap\x00', 0x20}) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYBLOB="f311b522fdaf98aea09be7d5d6f65a94a49ee1f40173476fe7d38500", @ANYRESOCT, @ANYBLOB], 0xfc30) 14:09:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'macsec0\x00', {0x2, 0x0, @local}}) 14:09:23 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:23 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 830.517702][T29639] loop2: detected capacity change from 0 to 4096 14:09:23 executing program 1: clone3(&(0x7f0000001340)={0xa000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0xffffffffffffffff], 0x1}, 0x58) [ 830.573719][T29639] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:23 executing program 3: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={0x0, r0+10000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x7]}, 0x8}) 14:09:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:24 executing program 5: prctl$PR_SET_FPEXC(0x39, 0x0) 14:09:24 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x0, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:24 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @rand_addr=0x64010101}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x72, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={r4, 0x8001, 0x9}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r5, 0x0) sendfile(r0, r1, 0x0, 0x20000000005) 14:09:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:24 executing program 1: prctl$PR_SET_FPEXC(0x38, 0x0) 14:09:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00008a7fe4)={0x5, 0x41, 0x6, 0x28}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00002ff000)={r0, 0x50, &(0x7f00007dc000)}, 0x10) 14:09:24 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x0) [ 831.111811][T29664] loop2: detected capacity change from 0 to 4096 [ 831.213086][T29664] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, 0x0, 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:24 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x2, @broadcast, 'bond_slave_0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x2, @dev, 'bond_slave_0\x00'}}, 0x1e) r2 = socket$kcm(0x10, 0x2, 0x0) dup3(r2, r0, 0x0) 14:09:24 executing program 5: getsockname$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 14:09:24 executing program 3: prctl$PR_SET_FPEXC(0x3b, 0x0) 14:09:24 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x0, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:24 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, 0x0, 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:24 executing program 1: prctl$PR_SET_FPEXC(0x28, 0x0) [ 831.748746][T29702] loop2: detected capacity change from 0 to 4096 [ 831.817742][T29702] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:25 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 14:09:25 executing program 5: prctl$PR_SET_FPEXC(0x2c, 0x0) 14:09:25 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080), 0x210000, 0x0) 14:09:25 executing program 1: sysinfo(&(0x7f0000000100)=""/20) 14:09:25 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, 0x0, 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:25 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x0, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) [ 832.570181][T29726] loop2: detected capacity change from 0 to 4096 14:09:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'wlan1\x00'}) 14:09:25 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:26 executing program 3: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) [ 832.698030][T29726] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:26 executing program 4: clone3(&(0x7f0000001680)={0x8104000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:09:26 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x800, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c2c0e709"}, 0x0, 0x0, @planes=0x0}) 14:09:26 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8ba19e76"}, 0x0, 0x0, @userptr}) 14:09:26 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, 0xffffffffffffffff, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:26 executing program 3: readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f0000000400)=""/147, 0x93}], 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/184, 0xb8}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) recvfrom$inet(r2, 0x0, 0x1e51de7a2ef3af5, 0x0, 0x0, 0x800e0077f) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf8, 0x0, 0x0, 0x800e00546) r4 = socket$inet_sctp(0x2, 0x1, 0x84) fchown(0xffffffffffffffff, 0x0, 0x0) connect$inet(r4, &(0x7f0000000100)={0x10, 0x2}, 0x10) shutdown(r2, 0x0) 14:09:26 executing program 1: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb809, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:09:26 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x68) syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x0) [ 833.168002][ T159] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 833.312242][T29764] loop2: detected capacity change from 0 to 4096 14:09:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 833.362836][T29764] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:26 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) 14:09:26 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:26 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) [ 833.818172][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f00000000c0)) 14:09:27 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, 0xffffffffffffffff, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:27 executing program 5: clone3(&(0x7f0000001340)={0xa000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) 14:09:27 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000040)={@broadcast, @local, @val, {@ipv6}}, 0x0) 14:09:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 834.007041][T29799] loop2: detected capacity change from 0 to 4096 [ 834.099607][T29799] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) 14:09:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:27 executing program 3: clone3(&(0x7f0000000780)={0x2800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:09:27 executing program 4: prctl$PR_SET_FPEXC(0x3c, 0x0) 14:09:27 executing program 1: clone3(&(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000015c0)=""/195, 0xc3, 0x0, 0x0}, 0x58) 14:09:27 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, 0xffffffffffffffff, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:27 executing program 4: alarm(0x3) 14:09:27 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f9787"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:27 executing program 3: socketpair(0x1, 0x0, 0xe6f, &(0x7f0000000040)) 14:09:27 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 14:09:27 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x10400, 0x0) [ 834.603986][T29828] loop2: detected capacity change from 0 to 4096 14:09:28 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x200007) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xc0, &(0x7f0000000080), &(0x7f0000000000)=0x4) [ 834.681042][T29828] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:28 executing program 4: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:09:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f9787"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:28 executing program 5: prctl$PR_SET_FPEXC(0x29, 0x0) 14:09:28 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x1e0}) 14:09:28 executing program 1: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xd, 0x10, 0xffffffffffffffff, 0x0) 14:09:28 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:28 executing program 5: setitimer(0x0, &(0x7f0000000000)={{0xfffffffffffffffd}}, 0x0) 14:09:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f9787"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:28 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x80000000}) 14:09:28 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 14:09:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 14:09:28 executing program 5: socket$inet(0x2, 0x2, 0x4) [ 835.285361][T29866] loop2: detected capacity change from 0 to 4096 14:09:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f6205539441"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 835.354994][T29866] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f6205539441"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(r0, 0x40047473, &(0x7f0000000000)) 14:09:28 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 14:09:28 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f6205539441"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:29 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:29 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x4}) 14:09:29 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000580)) [ 835.932476][T29903] loop2: detected capacity change from 0 to 4096 [ 835.970273][T29903] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:29 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000001100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) 14:09:29 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1013, 0xffffffffffffffff, 0x0) 14:09:29 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:29 executing program 1: setitimer(0x0, &(0x7f0000000000)={{}, {0x40000000000000}}, 0x0) 14:09:29 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote, 0x60}, 0x12) 14:09:29 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2040, 0x0) [ 836.399232][T29928] loop2: detected capacity change from 0 to 4096 14:09:29 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RVERSION(r0, 0x0, 0x4f) 14:09:29 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:29 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000000), 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') 14:09:30 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffab}, 0x0) 14:09:30 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, &(0x7f0000000e40)) 14:09:30 executing program 3: prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 14:09:30 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:30 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 14:09:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x1, 0x0) 14:09:30 executing program 1: pipe(&(0x7f0000006740)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_congestion(r0, 0x0, 0xff68) 14:09:30 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RREADDIR(r0, 0x0, 0xfffffffffffffe4d) [ 837.341434][T29968] loop2: detected capacity change from 0 to 4096 14:09:30 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x4000) 14:09:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 14:09:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') read$FUSE(r0, 0x0, 0x0) 14:09:30 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f3, &(0x7f0000000180)={'sit0\x00', 0x0}) 14:09:30 executing program 1: keyctl$search(0x14, 0x0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) [ 837.568245][T29968] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:30 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 14:09:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x0, 0x0, 0xd}, &(0x7f0000000080)=0x20) 14:09:31 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 14:09:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f00000001c0)={'ip6gretap0\x00', @ifru_flags}) 14:09:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8920, &(0x7f0000000180)={'sit0\x00', 0x0}) 14:09:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005f00)=[{{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000001780)="492feafc6c85b78881ae", 0xa}], 0x1}}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f0000001740)={'ip6gre0\x00', 0x0}) 14:09:31 executing program 4: keyctl$search(0xc, 0x0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) [ 838.047136][T30009] loop2: detected capacity change from 0 to 4096 14:09:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4f0, 0xf0, 0x300, 0xffffffff, 0x0, 0x300, 0x420, 0x420, 0xffffffff, 0x420, 0x420, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@ipv6={@mcast2, @remote, [], [], 'hsr0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv4=@local, @port, @gre_key}}}, {{@ipv6={@empty, @mcast2, [], [], 'syzkaller1\x00', 'veth0_vlan\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv6=@local, @icmp_id}}}, {{@ipv6={@private1, @private0, [], [], 'team0\x00', 'batadv_slave_1\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@frag={{0x30}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv6=@rand_addr=' \x01\x00', @port, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 14:09:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:31 executing program 1: r0 = socket(0xa, 0x80803, 0x9) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x8927, &(0x7f0000000040)) [ 838.100295][T30009] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:31 executing program 3: sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0x9, &(0x7f0000000000), 0x66) 14:09:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x1b96, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80284504, &(0x7f0000000240)) [ 838.287516][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 838.324851][T30026] x_tables: duplicate underflow at hook 1 14:09:31 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 14:09:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000017c0)={&(0x7f0000000000)=@nl, 0x80, 0x0, 0x0, &(0x7f0000000300)=[{0x10}, {0x10}], 0x20}, 0x0) 14:09:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x801) write$evdev(r0, &(0x7f0000000200)=[{}], 0x20000218) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 14:09:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:31 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3}}) 14:09:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f7, &(0x7f0000000180)={'sit0\x00', 0x0}) [ 838.644620][T30043] loop2: detected capacity change from 0 to 4096 14:09:32 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, &(0x7f00000000c0)) 14:09:32 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 838.731143][T30043] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@func, @map, @initr0]}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001280), 0x32, 0x10, &(0x7f00000012c0), 0x10}, 0x78) 14:09:32 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x0, 0x0, @remote, 0x60}, 0x12) [ 838.937497][ T159] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) 14:09:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "481504b39fbb3fd07c29eff24c0593731bda446e016151d5e340abbf86d3b55f4bb86da209e7a4bbd6be0d4b606e2c8d6cc221a5d864bbda8223fb1c4d23d083"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) 14:09:32 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000012000503"], 0x2c}}, 0x0) recvmmsg(r0, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000000840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000a80)=""/20, 0x14}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/154, 0x9a}, {&(0x7f0000002b80)=""/181, 0xb5}], 0x6}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x2000, 0x0) [ 839.256134][T30078] loop2: detected capacity change from 0 to 4096 [ 839.324739][T30078] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 839.386879][T30087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.492201][T30087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.534150][T30090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.554378][T30090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.583840][T30090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.594310][T30090] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.607128][T30087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 839.632295][T30087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:09:37 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed, 0x0, 0x2}, 0xe) 14:09:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xf, r0, 0x0, 0x0, 0x0) 14:09:37 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "481504b39fbb3fd07c29eff24c0593731bda446e016151d5e340abbf86d3b55f4bb86da209e7a4bbd6be0d4b606e2c8d6cc221a5d864bbda8223fb1c4d23d083"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) 14:09:37 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:37 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x0, 0x0, @remote, 0x60}, 0x12) 14:09:37 executing program 4: r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8906, 0x0) [ 843.991684][T30108] loop2: detected capacity change from 0 to 4096 14:09:37 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) 14:09:37 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "481504b39fbb3fd07c29eff24c0593731bda446e016151d5e340abbf86d3b55f4bb86da209e7a4bbd6be0d4b606e2c8d6cc221a5d864bbda8223fb1c4d23d083"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) [ 844.047195][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@get={0x1, 0x0}) 14:09:37 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d70000001010000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 844.114419][T30108] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0xfffffffffffffffc, 0x109c41) write$evdev(r0, &(0x7f0000000200)=[{}], 0x20000218) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, 0x24}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000007c0)={'wlan0\x00'}) 14:09:37 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4006012, r0, 0x0) 14:09:37 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x0, 0x0, @remote, 0x60}, 0x12) 14:09:37 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "481504b39fbb3fd07c29eff24c0593731bda446e016151d5e340abbf86d3b55f4bb86da209e7a4bbd6be0d4b606e2c8d6cc221a5d864bbda8223fb1c4d23d083"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x0) 14:09:37 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 14:09:37 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7000000101000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0xb8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="30daf962b20401040000000000000000000000000800034000000000"], 0x30}}, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x10, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x4000000000010046) [ 844.593946][T30141] loop2: detected capacity change from 0 to 4096 [ 844.691679][T30141] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000001c00)={0x14, r1, 0x9, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 14:09:38 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7000000101000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:38 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) 14:09:38 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote}, 0x12) 14:09:38 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d7000000101000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 14:09:38 executing program 1: rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)) 14:09:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000006c0), 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 14:09:38 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000540)='^', 0x1, 0x7fffffff}], 0x0, 0x0) [ 845.224192][T30169] loop2: detected capacity change from 0 to 4096 14:09:38 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 845.326790][T30169] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 845.330041][ T26] audit: type=1800 audit(1628258978.615:49): pid=30178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14005 res=0 errno=0 [ 845.399780][T30180] loop4: detected capacity change from 0 to 264192 [ 845.422543][ T26] audit: type=1800 audit(1628258978.705:50): pid=30178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14005 res=0 errno=0 14:09:38 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000b40)=[{&(0x7f0000000b00)="8e", 0x1, 0x10001}], 0x0, 0x0) 14:09:38 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) 14:09:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000003300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000003880)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:38 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote}, 0x12) 14:09:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000006c0), 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 14:09:39 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 845.685047][T30200] loop1: detected capacity change from 0 to 256 14:09:39 executing program 5: io_setup(0x2, &(0x7f0000000040)=0x0) io_getevents(r0, 0x3, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000100)={0x0, 0x989680}) [ 845.777493][ T26] audit: type=1800 audit(1628258979.065:51): pid=30208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14005 res=0 errno=0 [ 845.826990][T30200] loop1: detected capacity change from 0 to 256 14:09:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) getdents(0xffffffffffffff9c, 0x0, 0x0) 14:09:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000006c0), 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 14:09:39 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f00000005c0)) 14:09:39 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 845.956535][T30224] loop2: detected capacity change from 0 to 4096 14:09:39 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000009c0)='ext2\x00', &(0x7f0000000a00)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000b40), 0x1000, &(0x7f0000000b80)=ANY=[]) [ 846.074372][T30224] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 846.253323][ T26] audit: type=1800 audit(1628258979.525:52): pid=30241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14989 res=0 errno=0 14:09:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f00007fe000/0x800000)=nil, 0x7fffffffffffffff, 0x0, 0x10, r0, 0x0) 14:09:39 executing program 5: syz_emit_vhci(&(0x7f0000000100)=@HCI_ACLDATA_PKT={0x2, {0x0, 0x0, 0x0, 0xa}, @l2cap_cid_le_signaling={{0x6}, @l2cap_conn_param_update_rsp={{0x13, 0x0, 0x2}}}}, 0xf) 14:09:39 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:39 executing program 2: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x7) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4000010, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x2, 0x9, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x89b, 0x4, @perf_config_ext={0x1, 0x1515}, 0x0, 0x5, 0x8001, 0x0, 0xdb6, 0x0, 0x1, 0x0, 0xfac, 0x0, 0x7fffffff}, 0x0, 0x6, r0, 0xb) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @remote}, 0x12) 14:09:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000006c0), 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 14:09:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) 14:09:39 executing program 5: syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@random="67454b27c10a", @multicast, @val, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast}}}}}, 0x0) 14:09:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000006640)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x21, 0x0) [ 846.527945][ T151] Bluetooth: hci5: ACL packet for unknown connection handle 0 [ 846.536257][ T151] Bluetooth: hci5: ACL packet for unknown connection handle 0 [ 846.664782][ T26] audit: type=1800 audit(1628258979.945:53): pid=30268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=14990 res=0 errno=0 [ 846.759357][T30274] loop2: detected capacity change from 0 to 4096 14:09:40 executing program 5: syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000020c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{}, {@allow_other}]}}) 14:09:40 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) [ 846.833890][T30274] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 14:09:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)=0x2) 14:09:40 executing program 1: io_setup(0x4, &(0x7f0000000000)) io_setup(0x109, &(0x7f0000001700)=0x0) io_destroy(r0) 14:09:40 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 14:09:40 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/116) [ 847.139929][T30300] fuse: Bad value for 'fd' [ 847.175540][T30300] fuse: Bad value for 'fd' 14:09:40 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000021c0)='pagemap\x00') read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) 14:09:40 executing program 1: syz_mount_image$fuse(&(0x7f0000000100), &(0x7f0000002580)='./file1\x00', 0x0, 0x0, 0x0, 0x2402, &(0x7f00000025c0)) 14:09:40 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) shmctl$SHM_UNLOCK(0x0, 0xc) 14:09:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2002, 0x0) 14:09:40 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 14:09:41 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000580), 0x4000, 0x0) 14:09:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044591, 0x0) 14:09:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) 14:09:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\t'], 0x14}}, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000006140)) recvmmsg(r0, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d80)=[{0x0}, {&(0x7f00000024c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 14:09:41 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 14:09:41 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000440), 0x480, 0x0) 14:09:41 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 14:09:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000006140)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005f80)=[{{&(0x7f0000000880)=@can, 0x80, &(0x7f0000000900)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000940)=""/226, 0xe2}}, {{0x0, 0x0, &(0x7f0000000d80)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x40012010, &(0x7f0000006180)={0x0, r2+10000000}) 14:09:41 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="30daf962b2040104000000000000000000000000080003400000000000040500010001000000"], 0x30}}, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x10, r2, 0x175f2000) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x28, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4000000000010046) 14:09:41 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 14:09:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') linkat(r0, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x400) 14:09:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r1}}, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 14:09:42 executing program 2: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001440)=[{&(0x7f0000000080)="d89b", 0x2, 0xfff}, {&(0x7f0000000100)="c4", 0x1}], 0x0, 0x0) 14:09:42 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000600), 0xc804, 0x0) 14:09:42 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000002200)='fd/3\x00') [ 849.057784][T30377] loop2: detected capacity change from 0 to 15 14:09:42 executing program 4: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001140)=""/226) 14:09:42 executing program 1: syz_mount_image$ext4(&(0x7f00000009c0)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) [ 849.176281][T30377] loop2: detected capacity change from 0 to 15 14:09:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x92, 0x4) 14:09:43 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 14:09:43 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000380)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:43 executing program 1: io_setup(0x0, &(0x7f0000000000)) io_setup(0x3, &(0x7f0000000940)) 14:09:43 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$char_usb(r0, &(0x7f0000000080)="7253f9e9f53da8663930d7df", 0xc) 14:09:43 executing program 5: sysfs$2(0x2, 0x0, &(0x7f0000000280)=""/179) 14:09:43 executing program 3: syz_mount_image$fuse(&(0x7f00000003c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x19a9020, &(0x7f0000000340)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 849.827768][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:43 executing program 4: sched_setattr(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000000000010046) 14:09:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000040c0)='net/mcfilter\x00') read$FUSE(r0, &(0x7f00000099c0)={0x2020}, 0x2020) 14:09:43 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x6}], 0x1, &(0x7f00000000c0)={0x77359400}) 14:09:43 executing program 3: io_submit(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000f80), 0x9, 0x101400) 14:09:43 executing program 5: modify_ldt$read_default(0x2, &(0x7f0000000180)=""/231, 0xe7) 14:09:43 executing program 2: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000001440)=[{&(0x7f0000000080)="d89b", 0x2, 0xfff}, {&(0x7f0000000100)="c4", 0x1}, {&(0x7f00000002c0)='d', 0x1, 0x800000000000ffff}], 0x0, 0x0) [ 850.572703][T30428] loop2: detected capacity change from 0 to 8447 [ 850.665201][T30428] loop2: detected capacity change from 0 to 8447 14:09:44 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 14:09:44 executing program 4: r0 = fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 14:09:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:44 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f00000002c0)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:44 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x802464, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) chdir(0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 14:09:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1c) [ 850.969859][T30444] new mount options do not match the existing superblock, will be ignored [ 851.014051][T30448] loop5: detected capacity change from 0 to 255 14:09:44 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000800), &(0x7f0000000840)='./file0\x00', 0x0, 0x0, &(0x7f0000000c80), 0x0, &(0x7f0000000d40)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x74]}}]}) 14:09:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x2e040}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x967, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x5, 0x6, 0x0, 0x7f, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb29b, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x1202, 0x8, 0x6, 0x5, 0x5, 0x486, 0x8001, 0x0, 0x20000003, 0x0, 0x8b27}, r0, 0xa, 0xffffffffffffffff, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r1, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0x6}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)='\f', 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) 14:09:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 851.204699][ T26] audit: type=1800 audit(1628258984.486:54): pid=30463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=14225 res=0 errno=0 14:09:44 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000), 0x10) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) clock_gettime(0x0, &(0x7f000000cbc0)) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 14:09:44 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='}\x00', &(0x7f00000000c0)='\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 14:09:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 851.845118][T30463] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 851.929577][T30485] devpts: called with bogus options [ 852.010968][T30489] devpts: called with bogus options 14:09:45 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @dev}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000ac0)="ee", 0xff00}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14b5255fb718bef93da5b9134015a860f5878c37ffe36e116ff14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afadb4054198e403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0a98a61d7da0c86d700000010100000000000"], 0x10b8, 0x48000000}, 0x700) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 14:09:45 executing program 5: clock_adjtime(0x0, &(0x7f0000000140)={0x3e, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}) 14:09:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 852.063865][ T26] audit: type=1800 audit(1628258985.346:55): pid=30490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=14225 res=0 errno=0 14:09:45 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='}\x00', &(0x7f00000000c0)='\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 852.383591][T30505] devpts: called with bogus options 14:09:45 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x802464, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) chdir(0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 14:09:45 executing program 5: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='}\x00', &(0x7f00000000c0)='\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 14:09:45 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x2e040}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x967, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x5, 0x6, 0x0, 0x7f, 0x0, 0x40, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb29b, 0x4, @perf_bp={&(0x7f0000000380), 0x1}, 0x1202, 0x8, 0x6, 0x5, 0x5, 0x486, 0x8001, 0x0, 0x20000003, 0x0, 0x8b27}, r0, 0xa, 0xffffffffffffffff, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r1, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000480)="e6", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=']', 0x1}, {&(0x7f0000000200)='@', 0x1}, {&(0x7f0000000240)="13", 0x1}, {&(0x7f0000000280)="f2", 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000c00)='A', 0x1}, {&(0x7f0000000cc0)='^', 0x1}, {&(0x7f0000000040)='w', 0x1}, {&(0x7f0000000180)="1555fbf93cd1", 0x6}], 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)="f7", 0x1}, {&(0x7f00000011c0)="8e", 0x1}, {&(0x7f0000001240)="d2", 0x1}, {&(0x7f0000001300)='e', 0x1}, {&(0x7f0000000140)='h', 0x1}, {&(0x7f0000001380)='N', 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)='\f', 0x1}, {&(0x7f0000001740)='b', 0x1}], 0x2}}], 0x5, 0x60cd800) 14:09:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) 14:09:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000006540)='./file0\x00', &(0x7f0000006580), 0x0, &(0x7f00000065c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b]}}, {@huge_within_size}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user.incfs.metadata\x00'}}]}) [ 852.460847][ T26] audit: type=1800 audit(1628258985.746:56): pid=30509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=14033 res=0 errno=0 14:09:45 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) [ 852.540802][T30511] devpts: called with bogus options [ 852.616814][T30515] tmpfs: Unknown parameter 'smackfstransmute' 14:09:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x12, 0x0) 14:09:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) 14:09:46 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@local, @remote, @empty, 0x0, 0x40, 0x0, 0x100}) 14:09:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:46 executing program 0: r0 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x4) 14:09:46 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000800), &(0x7f0000000840)='./file0\x00', 0x0, 0x0, &(0x7f0000000c80), 0x0, &(0x7f0000000d40)) 14:09:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000680)={0x0, @l2tp={0x2, 0x0, @empty}, @can, @vsock}) 14:09:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5452, &(0x7f0000000000)=0x81b) 14:09:46 executing program 5: r0 = msgget(0x0, 0x1c8) msgrcv(r0, &(0x7f0000000000)={0x0, ""/122}, 0x82, 0x2, 0x2000) msgctl$IPC_STAT(r0, 0x2, 0x0) msgrcv(r0, 0x0, 0x0, 0x99c94e93401dbda5, 0x0) 14:09:46 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') r4 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000001880)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) sendfile(r4, r3, 0x0, 0x1) [ 854.696695][T30561] syz-executor.0 (30561): drop_caches: 1 14:09:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000003300)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000000100)=[{0x0}, {&(0x7f0000001bc0)=""/183, 0xb7}, {&(0x7f0000001c80)=""/34, 0x22}, {&(0x7f0000000080)=""/66}, {&(0x7f0000000000)=""/36}], 0x3}}], 0x4000000000000b0, 0x12002, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0'}, 0xb) 14:09:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1}]}]}}, &(0x7f0000000080)=""/160, 0x2e, 0xa0, 0x1}, 0x20) 14:09:48 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:48 executing program 2: r0 = openat$tun(0xffffff9c, &(0x7f0000000000), 0x101081, 0x0) write$tun(r0, 0x0, 0x0) 14:09:48 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f00000000c0)=0x73, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x858) 14:09:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f00000003c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000000600)="81", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000880)="1e", 0x1}], 0x1, &(0x7f0000001d00)=ANY=[], 0x1030}}, {{0x0, 0x0, 0x0}}], 0x4, 0x20008001) 14:09:48 executing program 2: unshare(0x6c060000) shutdown(0xffffffffffffffff, 0x0) 14:09:48 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000000)={'nr0\x00'}) 14:09:48 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x5, &(0x7f0000000180)=@framed={{}, [@initr0]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x10, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x3, 0xe4, &(0x7f0000000280)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:48 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000000)={'nr0\x00'}) 14:09:48 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 855.566507][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:48 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200)={0x0, 0x0, 0x3ff, 0x1}, 0x34) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x890b, &(0x7f00000001c0)={'syztnl2\x00', 0x0}) 14:09:49 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000000)={'nr0\x00'}) 14:09:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x8) 14:09:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x5}, 0x40) 14:09:49 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f00000003c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000005c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000000600)="81", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000880)="1e", 0x1}], 0x1, &(0x7f0000001d00)=ANY=[], 0x1030}}], 0x3, 0x20008001) 14:09:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0xa, &(0x7f00000002c0)) 14:09:49 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000000)={'nr0\x00'}) 14:09:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 14:09:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f00000003c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000000600)="81", 0x1}], 0x1}}], 0x2, 0x20008001) 14:09:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0xa, &(0x7f00000002c0)) 14:09:49 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect(r0, &(0x7f0000000000)=@x25, 0x80) 14:09:49 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 14:09:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2020, 0x4) sendmmsg(r0, &(0x7f00000072c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)="04", 0x1}], 0x1}}], 0x1, 0x0) 14:09:49 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000600)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) 14:09:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x11, 0xb, &(0x7f0000000040)={0x7, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) 14:09:49 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendmmsg$sock(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) 14:09:49 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000040), 0x1959cc36) 14:09:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0xa, &(0x7f00000002c0)) 14:09:49 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 14:09:49 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000600)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) 14:09:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000000100)=@bridge_getlink={0x24, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_VF_PORTS={0x4}]}, 0x24}}, 0x0) 14:09:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:49 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) connect(r0, &(0x7f0000000640)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80) 14:09:50 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="ba", 0x200000c1}], 0x1, &(0x7f00000004c0)=[{0x28, 0x0, 0x0, "37825d03cad98a28f1197b736317556e1b"}], 0x28}, 0x0) 14:09:50 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 14:09:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 14:09:50 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002640)=ANY=[@ANYBLOB="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"/2633], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0, 0x0) 14:09:50 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000028c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002400)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@rr={0x7, 0xb, 0x7, [@initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x40}}], 0x1, 0x0) 14:09:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:50 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r0}]}, 0x28}], 0x1}, 0x0) 14:09:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000d000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="2800000010000104000000000000000400000000", @ANYRES32=r3, @ANYBLOB="00000000047a000008000a00", @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010000b0023008076af43ef4a9a2bcc00", @ANYRES32=r6, @ANYBLOB="00000002"], 0x3c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) 14:09:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @dev}}) 14:09:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x38, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}]}, 0x38}}, 0x0) 14:09:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x5, 0x4) 14:09:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:50 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r0}]}, 0x28}], 0x1}, 0x0) [ 857.276574][T30719] device bridge1 entered promiscuous mode [ 857.314654][T30726] device bridge_slave_0 left promiscuous mode [ 857.332129][T30726] bridge0: port 1(bridge_slave_0) entered disabled state 14:09:50 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000074", 0x15) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'ipvlan0\x00', {0x2, 0x0, @broadcast}}) [ 857.376754][T30726] bridge1: port 1(bridge_slave_0) entered blocking state [ 857.392969][T30726] bridge1: port 1(bridge_slave_0) entered disabled state 14:09:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 857.459758][T30726] device bridge_slave_0 entered promiscuous mode [ 857.490970][T30726] bridge1: port 1(bridge_slave_0) entered blocking state [ 857.498188][T30726] bridge1: port 1(bridge_slave_0) entered forwarding state 14:09:50 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r0}]}, 0x28}], 0x1}, 0x0) [ 857.575835][T30719] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 857.611834][T30719] bridge1: port 1(bridge_slave_0) entered disabled state 14:09:50 executing program 2: add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @auto=[0x61, 0x39, 0x64, 0x31, 0x30, 0x62, 0x0, 0x0, 0x39]}, &(0x7f0000000380)={0x0, "19d7aeb7955200a1650c89a675bb880bcfea3a5a90c0638a71bd00cce6a4fd6ed60150f8f40e9b7d7d4aedd3ef29592292f6d32662b3f41f22a9cb386510f7ba"}, 0x48, 0xfffffffffffffffc) [ 857.658451][T30719] device bridge1 left promiscuous mode 14:09:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 858.129602][ T149] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 858.547716][T30748] bridge1: port 1(bridge_slave_0) entered blocking state [ 858.554857][T30748] bridge1: port 1(bridge_slave_0) entered forwarding state [ 858.574070][T30748] device bridge1 entered promiscuous mode 14:09:51 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) sendmmsg(r0, &(0x7f0000001380)=[{{&(0x7f00000001c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x0, 0x4}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000005c0)="f89b7daf445d57e834afec610c73d2e109ba97d812c6d1f175d01a604492e778a58f3fad6ca92fd691d48f5fe931a9c25b0a65bf04a15182a143de6c76691dc2c59cbf86d8f1a5c7cd778530387e5fabb11eada852af9ce744b0c8c657ef185ae17e6e1028f039609decfbde7420effdd1adc02e5147b59acf705f54fc1a33d2", 0x80}, {0x0}, {0x0}, {&(0x7f0000000880)}], 0x4}}, {{&(0x7f00000009c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x80, &(0x7f0000000c80)=[{0x0}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000000dc0)=@hci, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e40)="4f620d93904a5ddb9c56e1f0bebef43198839c3ce725d71419d174474d0eeaa0ffb1a11ebb0be2af013013528525a661560955328ca2b3a18c5185a08c536c6dfec72400c4c411f8fa2a550ff992b92285caa9e4cf13051109e1bd23300a5145fe400344e1b85dfb74ba10f3b3774547750f03247a1b3a85c94024a8d017ba1b3e1d36e6585fffcad5e80df02ca1a57e46ed", 0x92}], 0x1, 0x0, 0x1558}}, {{0x0, 0x0, &(0x7f0000002600)=[{0x0}, {&(0x7f00000025c0)="0113f59ea4d93eb46bc79da511219155f6c3b32fe455ba1c5858c582b27cb0e4491a2fb1b50e8cab0fa9c12249d5c97b7abd5590a40dc74e300945", 0x3b}], 0x2}}], 0x5, 0x8805) 14:09:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r0, r1) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:09:51 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x76, 0x0, &(0x7f0000002000)) 14:09:51 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:51 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000074", 0x15) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'ipvlan0\x00', {0x2, 0x0, @broadcast}}) 14:09:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@dontfrag={{0x14, 0x29, 0x3e, 0xae5}}], 0x18}}], 0x1, 0x0) 14:09:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x4}]}, 0x20}}, 0x0) 14:09:52 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:52 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @private}}, 0x1e) 14:09:52 executing program 1: syz_emit_ethernet(0x1a6, &(0x7f00000005c0)=ANY=[], 0x0) clock_gettime(0x2, &(0x7f0000000080)) 14:09:52 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:52 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x89, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 14:09:52 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x11, 0x64, &(0x7f0000000040)={0x3, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) 14:09:52 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$sock(r0, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:09:52 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:52 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) [ 859.325847][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge1: link becomes ready 14:09:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x11, 0x64, &(0x7f0000000040)={0x100, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) 14:09:52 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7ffff, 0x0, 0x0) 14:09:52 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, &(0x7f0000000080)) 14:09:52 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001a40)=[{{&(0x7f0000000540)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00'}, 0x1c, &(0x7f00000018c0)=[{&(0x7f0000000580)="868b0bc30d720a134c39d0f3ffd7e3b8b83dc221d347794423b37de3d18e417a38d18783dc9107dcc8583c4b649e134953be9fa84245b043e971d4f89580931b50dc0f63d27f3056be7ef9e2373404cdc659cc0f0b41ad3f65d209416568ce27081a537baa0fec396ab29cbbcafbf7b58770f2819096a5b1051b32d66a244040f9053e2c6ead69ffc6068e9fff919ce8d8d30c29fc860549e0311e10f2515d7bd7de2d29089291a337a5bf071265a7f7", 0xb0}, {&(0x7f0000000640)="b32e7568f1d0cd88b155e45485d0adf2d4333a9ce9815a34d4637541d349f00a441622f9f93b43aacdb40d7b240cf47a16d2e4657745e4b4ca0ef4134ef94326ad881b5198fd84226966e0618bfc7af0de934088270b09b3457845f47d81ba4ada1f0eacb0a52a55d7ab33ce532a872c9190c3ac60da729ef1f756b8a1cd7ad6436ebbb24a9f68f9e718bd7e244ceb41509acfb985715f2afd28458900e930adc8365c81b0a2a31023355ce82320c57646ceea358c71b2808cd41728cc22489edf58dc30c25ea9aa31ba2f745875c780d3c62a9aeac5ddc87441b34cc344167778eb6f14d1db9bef1776700406e242299d2bfefdb19c4dd1621c8323b683f4eef0c8d88996ad1111d214bb6e1d4a4cb804f627dfcb1bd12d5ec5fa89c0aca525d6aae12fe0d4c2930ed1d6e29eb1ffda376cc49318edd45897868f929c37d114891a1a7e7e7002b2e27654d850694f9ce0916ad3146283cd9aed9a84e91eb8b6ca2c70c76076e86f354fe0527c52d0d975d79d18b05ea6e6bd1d27dcdf46af9159e61c6debbb304db1e5e325e44b325d7834b4f260e47aeaf0f6a9ab7e4c05620bc2997893477b3436a398f5108bf5f4bb3b416fcde973960ffb1915a161e3e74a8d482e583fee96521b1692609daacb7a7060b9f81b9bf40ecfcd78c7161570c219776d845c9ad65ef4d5ce9da0547949f71bc5d34fd57d264b7a3dca5faf5234ded83d6283a68e37cbebab2bd1d76f98ffb412f34949ccdbce0b71f58e3cce499a9cd8e4e64da89882053b82c5ead2948314e0f5e6626193a06dbeba71bd29d6bd710e744a0be44ae8e40b697a65fa1c1cacbdb524300ac5471d4bb038e703ca56fa5ca3e1ea35237f421f5496118de904c85949baabbdd2aa91b49c6d5c14ef97d09654f408739aca994be9d4c1c6643d4b93b3cf6ffa5ca6f8311f2871e0e593854cefe407e451d15734a7f93de4f64b4ac0849dfac1ad7b971676cbd6cf14c9e8f215f83f4a4142ca6c3f298d74770d3aa808cbdee08da8d3b760db73ed3a3622aa596015830dcc4df2c5b358650a91d2fcdee38697ffa37ed5b8cd4e1db0a579cc67765ff9b283339e5e90d6f5211f1464ae140332634ff3b7cd7470b7c8752f76719df37b870b4363e6bd0e10957335879ec2aec2ea4ccfc97f983d63bd0398e6bc90d679d704a474a0fd9a5b54d5ba23abc11c6e01ce0c9b8f5e6855c2f5a5436bc635031f80b63b96fdf0ebfaf235c577750f49fa1e0802cbf9bce738cb34a92e0b4eb98ea98c2f659c479480b42be984284ca0fa2a5d3582bae84ae17ebbca04b5825170b17f499b6fc4517150669aaf73b2a2d1eb55415360af07106613ab376c0c30108dce146947a44ba7b1e29850bbdefc68691fa9b3efbae75b937b256339188fc570ceb7029238ec22ee28838fd44a0679b677cc3fca166328a30a66445a17bd3b98988e61adc20958f21547b5da0d6ff4cb98d5ff41782083694e6ca49dab554d79e254557740ea27282e27920c91024a55840a7afb2dd0290ce0bae338990db7bf1a6c6ad312865ad9c96b35920efcc552426fd4504fcf3a2d131ca751505339ed79376c67ce01557607988db59311d12bf2acc9d2cc398697cb1aabc51da7cc00598ac8b6cc506b4cac2990906de15afc6747a123c61e51f2c29f34900d9789de36c6afe7b505678d3c71ee35c047998dfc2f8182738fa86bac0a7b99a8d621140ba9d765ed990cd9c05c65e22adfdaa2416b81c65b94e37748378c592f79c701b4097e75b51f25a7272ef5d3337436bea2ede074721d7fa73b186796b89bd7d1eb1ec57daf0cae73648e033f1bc539d3ae0f5a", 0x51d}], 0x2, &(0x7f0000001940)=[@hopopts={{0x18}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x10000}}, @dstopts_2292={{0x18}}], 0x60}}], 0x1, 0x8000) 14:09:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:53 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bic\x00', 0x4) 14:09:53 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x6}, 0x40) 14:09:53 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:53 executing program 1: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x890b, &(0x7f00000001c0)={'syztnl2\x00', 0x0}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="7400000000010104000000000000000002000000240001801400018008000100e000000108000200000000000c0002800500010000000000240002801400018008000100ac14140008000200ac1e00010c0002800500010000000000080007400000edff0f0010"], 0x74}}, 0x0) 14:09:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/160, 0x2e, 0xa0, 0x1}, 0x20) 14:09:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x24}}, 0x0) 14:09:53 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) [ 860.096375][T30832] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 860.191287][T30840] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 14:09:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}]}, 0x3c}}, 0x0) 14:09:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:09:53 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000100)='./file0\x00'}, 0x10) 14:09:53 executing program 1: accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x0, 0x80000) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) 14:09:53 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:09:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x5}, 0x40) 14:09:53 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000100)='./file0\x00'}, 0x10) 14:09:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x0, 0x0}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:53 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000034c0)=[{{&(0x7f00000003c0)={0xa, 0x4e23, 0x0, @loopback={0x300}}, 0x1c, 0x0}}], 0x1, 0x0) 14:09:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x0, 0x0, 0xf695a66}, 0x40) 14:09:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:09:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000001080)={0x14, 0x0, 0x5, 0x101}, 0x14}}, 0x0) 14:09:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:54 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:54 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{}, "b10a26e608d50a8b", "32faea2cb39e1903d435b05e72c6c921", '\x00\r\x00n', "38c332a690de4152"}, 0x28) 14:09:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x1, &(0x7f00000004c0)=@raw=[@func], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:54 executing program 1: r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r1) 14:09:54 executing program 5: socket(0x200000000000011, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) [ 861.326624][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:54 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) 14:09:54 executing program 0: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 14:09:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001800)=@gettaction={0x24, 0x32, 0x0, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x24}}, 0x0) 14:09:54 executing program 5: socket(0x200000000000011, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:55 executing program 4: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000000)=0x4, 0x3f, 0x0) 14:09:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000040)={'veth1_vlan\x00', @ifru_map}) 14:09:55 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:55 executing program 1: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="a000", 0x2, 0xfffffffffffffffd) 14:09:55 executing program 5: socket(0x200000000000011, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:55 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB='D\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400129909000100626f6e64000000001400028005000d"], 0x44}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010005fff000005000000000001000000", @ANYRES32=0x0, @ANYBLOB="0092000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 14:09:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) 14:09:55 executing program 1: io_setup(0x6, &(0x7f0000000040)=0x0) io_setup(0x3, &(0x7f00000000c0)) io_setup(0x8, &(0x7f0000000000)) io_destroy(r0) 14:09:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:55 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:55 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) [ 862.226058][T30955] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:09:55 executing program 0: r0 = add_key$user(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='#', 0x1, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) 14:09:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 862.278173][T30955] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 14:09:55 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:55 executing program 1: mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 14:09:55 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:55 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 14:09:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8913, &(0x7f00000005c0)={'veth0_to_team\x00', @ifru_data=0x0}) 14:09:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10000e, 0x0) 14:09:56 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000003c0), 0x0, 0x0, 0x0, r0) 14:09:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000180), 0x0}, 0x20) [ 863.167780][ T26] audit: type=1326 audit(1628258996.456:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=30990 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 14:09:56 executing program 5: socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000003c0), 0x0, 0x0, 0x0, r0) 14:09:56 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 14:09:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000180), 0x0}, 0x20) [ 863.512038][ T26] audit: type=1326 audit(1628258996.796:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31009 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 14:09:56 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000003c0), 0x0, 0x0, 0x0, r0) 14:09:56 executing program 5: socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 863.822128][ T26] audit: type=1326 audit(1628258997.106:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31027 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 863.894518][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:09:57 executing program 1: add_key$user(&(0x7f0000000200), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) 14:09:57 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 14:09:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000180), 0x0}, 0x20) 14:09:57 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "50ede84c9a86d26947f1c328a3e88ff2798c33dca2dc019aab3103fda6ae8c84d7c32af6350781a313c74d16f91d7e96b0700cd8f256edaa2f8d84a866a113cf"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000003c0), 0x0, 0x0, 0x0, r0) 14:09:57 executing program 5: socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:57 executing program 0: mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) 14:09:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:57 executing program 4: process_vm_writev(0xffffffffffffffff, &(0x7f0000001880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 14:09:57 executing program 1: r0 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r0) 14:09:57 executing program 5: socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:57 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:57 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:57 executing program 4: request_key(0x0, 0x0, &(0x7f0000000080)='keyring\x00', 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) 14:09:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f000061b000/0x2000)=nil, 0x2000, 0x3800007, 0x2010, r0, 0x9ea00000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d0400100000002f3144e800000000030006000720000002004000e0000001000000f5000000000800120002000100000000000000000030006c000301009f6eae02000000adb20200000000152c000000000000000001020014bb000200000000002300000000030005000020000002"], 0x80}}, 0x0) recvmmsg(r0, &(0x7f0000004000)=[{{&(0x7f0000000300)=@x25, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)}, {&(0x7f0000000400)=""/210, 0xd2}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/93, 0x5d}, {&(0x7f0000001580)=""/35, 0x23}, {&(0x7f00000015c0)=""/171, 0xab}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/230, 0xe6}, {&(0x7f0000002780)=""/245, 0xf5}, {&(0x7f0000002880)=""/187, 0xbb}], 0xa, &(0x7f0000002a00)=""/50, 0x32}, 0x7}, {{&(0x7f0000002a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002ac0)=""/93, 0x5d}, {&(0x7f0000002b40)=""/235, 0xeb}, {&(0x7f0000002c40)=""/236, 0xec}], 0x3, &(0x7f0000002d80)=""/254, 0xfe}}, {{&(0x7f0000002e80)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f00)=""/157, 0x9d}], 0x1, &(0x7f0000003000)=""/4096, 0x1000}, 0x9}], 0x3, 0x41, &(0x7f00000040c0)={0x77359400}) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f00000000c0), 0x2c8, 0x0) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 14:09:57 executing program 5: socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:57 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, 0xa, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 14:09:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x80, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x800, r2, 0x1, 0x0, 0x6, @dev}, 0x14) r3 = creat(&(0x7f0000001200)='./file0\x00', 0x0) dup2(r0, r3) sendto$inet6(r3, &(0x7f0000000200)="0204000003006039001e2b7b5b5aa242b92200000000000000f02600e16a8a00080694714b159f720900a95e", 0x2c, 0x0, 0x0, 0x0) 14:09:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:58 executing program 5: socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:58 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000600)=0x5, 0x4) 14:09:58 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)={0x24, 0x29, 0x9e839f4f6e97b157, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x42, 0x0, 0x0, @u32}]}]}, 0x24}], 0x1}, 0x0) 14:09:58 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:58 executing program 4: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 14:09:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:58 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:58 executing program 1: sched_setattr(0x0, &(0x7f00000003c0)={0x38}, 0x0) sysinfo(&(0x7f0000000000)=""/209) 14:09:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:58 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:58 executing program 4: clock_getres(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000100)) 14:09:58 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 14:09:58 executing program 1: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="fe") clock_getres(0x0, &(0x7f0000000200)) 14:09:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:58 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:58 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:09:58 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 14:09:58 executing program 4: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) mlock2(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x0) 14:09:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x20, 0x0, 0xfeff) 14:09:59 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:59 executing program 2: r0 = socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a1c, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x9) fallocate(r0, 0x3, 0x0, 0x1fbfc) 14:09:59 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 14:09:59 executing program 1: capset(&(0x7f0000000500)={0x19980330}, &(0x7f0000000540)) capset(&(0x7f00000002c0)={0x20080522}, &(0x7f0000000300)) 14:09:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:59 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:59 executing program 2: r0 = socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:09:59 executing program 1: getrusage(0x1, &(0x7f0000001100)) 14:09:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:09:59 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:09:59 executing program 4: request_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='$%\x00', 0x0) add_key(&(0x7f0000000b80)='.dead\x00', &(0x7f0000000bc0)={'syz', 0x0}, &(0x7f0000000c00)="acf95d78b6bfa7efb1a54f6ce566fdc9b84b49fd258faebedef0a449b92069a476886987dd6244210fa6de3722d750213b93ed1302bda3f3d690ec30b85328e8de5a3bb07b56f4585dbf116dc04e80e567250767ac0627dccfe8c2cd4b28fc300e7b2993a48be38f97297633d5b8f23d016e8d0d70f3c1f66aa611b9b55fa8c5880fe66ba34861a33f7ba483925e", 0x8e, 0xffffffffffffffff) 14:09:59 executing program 1: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000000)=0x5, 0x9, 0x2) 14:09:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:09:59 executing program 2: r0 = socket(0x0, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:00 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:00 executing program 1: inotify_init() perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') preadv(r0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/132, 0x84}], 0x1, 0x0, 0x0) 14:10:00 executing program 4: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001680), 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 14:10:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:00 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:00 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 867.087420][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:10:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 14:10:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:00 executing program 1: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4000c300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x18) wait4(0x0, 0x0, 0x4, 0x0) r1 = gettid() r2 = gettid() tgkill(r1, r2, 0x24) 14:10:00 executing program 0: capset(0x0, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:00 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:00 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:00 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)={0x118, 0x11, 0x9e839f4f6e97b157, 0x0, 0x0, "", [@nested={0x107, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x4}, @generic="1622d5a5da757fa663e9a73c6cad8e1de1a2c5d27d419032f3ae94dca4a0c2761a17fef830ed9672c30a384feb1a23c7f119a0d437c9654d185e96f170bb7b7e8d5e465a6d9ddbe4aa74e78944a16346f489fb5309122127f3aafaac3ca38a32dee432b4c713d5ed1997d341b26df0a9686ba5f2bf5627e2acff22e7e8553cc132d4f9eea0e8030c02010854d02d8b10cb5376affd31ec1ca185ad6c782b69be151e4d3cf8cc84cbd9411926db12617b44cc0c07c06328811c97b02fbc6f3d7fa45959f00b4ed074e40d0b454410f5d91fe516b8a5f32c9537942ad183d85489ddb737715523edf60af3eb47bf105f8d7216191986262e"]}]}, 0x118}], 0x1, 0x0, 0x0, 0x4040000}, 0x0) 14:10:01 executing program 0: capset(0x0, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:01 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:01 executing program 2: r0 = socket(0x200000000000011, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:01 executing program 1: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002) 14:10:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x300000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0xc, &(0x7f0000001040)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e0009ba000000000000000007"], 0x20}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0) 14:10:01 executing program 0: capset(0x0, &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:01 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x11, 0x0, 0x55) 14:10:01 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:01 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:01 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:01 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:10:01 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:01 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:02 executing program 4: pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) read$eventfd(r0, 0x0, 0x0) 14:10:02 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:02 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, 0x0) tkill(0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:10:02 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:02 executing program 0: capset(&(0x7f0000000240), &(0x7f0000000280)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 869.009893][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:10:02 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:02 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:02 executing program 0: capset(&(0x7f0000000240)={0x19980330}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 869.154654][ C1] sd 0:0:1:0: [sg0] tag#3977 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 869.165105][ C1] sd 0:0:1:0: [sg0] tag#3977 CDB: opcode=0xe5 (vendor) [ 869.172045][ C1] sd 0:0:1:0: [sg0] tag#3977 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 869.181665][ C1] sd 0:0:1:0: [sg0] tag#3977 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 869.191287][ C1] sd 0:0:1:0: [sg0] tag#3977 CDB[20]: ba 14:10:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 869.250475][ C0] sd 0:0:1:0: [sg0] tag#3978 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 869.260943][ C0] sd 0:0:1:0: [sg0] tag#3978 CDB: opcode=0xe5 (vendor) [ 869.267888][ C0] sd 0:0:1:0: [sg0] tag#3978 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 869.277580][ C0] sd 0:0:1:0: [sg0] tag#3978 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 869.287198][ C0] sd 0:0:1:0: [sg0] tag#3978 CDB[20]: ba 14:10:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') inotify_rm_watch(r0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:10:02 executing program 0: capset(&(0x7f0000000240)={0x19980330}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:02 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:02 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 14:10:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) fstat(0xffffffffffffffff, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000440)) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000100)={0x1, 0x0, 0x1000, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x4400, 0x0) gettid() clone(0x40808000, 0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(0x0, 0x1e) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8003, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0xffb, 0x0, 0xe1a, 0x4, 0x80, 0x0, 0x6, 0x0, 0x100000000}, r2, 0x8, r3, 0x6ee4ca8bd571317b) clone(0x480000, &(0x7f0000000040), 0x0, 0x0, 0x0) [ 869.647359][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.653727][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 869.739795][ C0] sd 0:0:1:0: [sg0] tag#3979 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 869.750296][ C0] sd 0:0:1:0: [sg0] tag#3979 CDB: opcode=0xe5 (vendor) [ 869.757248][ C0] sd 0:0:1:0: [sg0] tag#3979 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 869.766856][ C0] sd 0:0:1:0: [sg0] tag#3979 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 869.777242][ C0] sd 0:0:1:0: [sg0] tag#3979 CDB[20]: ba 14:10:03 executing program 0: capset(&(0x7f0000000240)={0x19980330}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 14:10:03 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:03 executing program 1: pipe2(0x0, 0x42000) 14:10:03 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 14:10:03 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303330363131363700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:03 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) [ 870.580249][ C0] sd 0:0:1:0: [sg0] tag#3980 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 870.590699][ C0] sd 0:0:1:0: [sg0] tag#3980 CDB: opcode=0xe5 (vendor) [ 870.597651][ C0] sd 0:0:1:0: [sg0] tag#3980 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 870.607261][ C0] sd 0:0:1:0: [sg0] tag#3980 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 870.616882][ C0] sd 0:0:1:0: [sg0] tag#3980 CDB[20]: ba [ 870.770282][T31396] loop1: detected capacity change from 0 to 1024 [ 871.592672][T31396] EXT4-fs warning (device loop1): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 871.592672][T31396] [ 872.846758][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 874.778409][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 878.618370][ T8] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 880.526575][T18829] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:10:14 executing program 4: r0 = fsopen(&(0x7f0000000000)='9p\x00', 0x0) fsmount(r0, 0x0, 0x0) 14:10:14 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:14 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:14 executing program 0: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 14:10:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303330363131363700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 880.871718][T31460] loop1: detected capacity change from 0 to 1024 14:10:14 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:14 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:14 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0xfff, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) 14:10:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 881.078555][T31473] loop0: detected capacity change from 0 to 1024 14:10:14 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 881.199653][T31473] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,,errors=continue. Quota mode: writeback. 14:10:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:14 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001b00)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_retopts={{0x18, 0x0, 0x7, {[@noop, @ra={0x94, 0x4, 0x2fe}]}}}], 0x18}}], 0x1, 0x0) [ 881.477519][T31501] loop0: detected capacity change from 0 to 1024 [ 881.558133][T31501] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,,errors=continue. Quota mode: writeback. [ 881.679072][T31460] EXT4-fs warning (device loop1): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 881.679072][T31460] 14:10:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303330363131363700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:15 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 14:10:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)={0x20, 0x2, 0x1, 0x103, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0xc, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, 0x20}}, 0x0) 14:10:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 881.889561][T31519] loop0: detected capacity change from 0 to 1024 14:10:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x2, 0x4, &(0x7f0000000440)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:10:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:15 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x0, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 881.986096][T31519] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,,errors=continue. Quota mode: writeback. [ 882.014263][T31532] loop1: detected capacity change from 0 to 1024 14:10:15 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x0, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 882.322816][T31552] loop0: detected capacity change from 0 to 1024 [ 882.354080][T31552] EXT4-fs (loop0): mounted filesystem without journal. Opts: quota,,errors=continue. Quota mode: writeback. [ 882.835506][T31532] EXT4-fs warning (device loop1): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 882.835506][T31532] 14:10:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303330363131363700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000012400)='PMM', 0x3, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) 14:10:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x38, 0x2, [@TCA_TBF_RATE64={0xc, 0x4, 0x8008e44a674f23b4}, @TCA_TBF_PARMS={0x28, 0x1, {{}, {}, 0x0, 0x2}}]}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x88}}, 0x0) 14:10:16 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:16 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x0, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) [ 883.026234][T31575] loop0: detected capacity change from 0 to 1024 14:10:16 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:16 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:16 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/20) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffffff, 0x0, 0x0, 0x24) getpgid(0x0) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0x64000000, 0x4, 0xd0e0011, 0x0, 0xc6, 0x1d8, 0x1d8, 0x190, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', '\x00', {}, {}, 0x1}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40}, {[0x0, 0x0, 0x20000000]}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x2}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x31f) 14:10:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:16 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() rt_sigqueueinfo(0x0, 0xa, &(0x7f00000002c0)) [ 883.170957][T31587] loop1: detected capacity change from 0 to 1024 [ 883.432392][T31603] loop0: detected capacity change from 0 to 1024 [ 883.972942][T31587] EXT4-fs warning (device loop1): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 883.972942][T31587] 14:10:17 executing program 4: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x5) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x4000) setuid(0xee00) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f000016b000/0x1000)=nil) shmget$private(0x0, 0x4000, 0x4, &(0x7f0000217000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmget$private(0x0, 0x1000, 0x10, &(0x7f0000ffe000/0x1000)=nil) shmget(0x0, 0x1000, 0x78000000, &(0x7f0000ffe000/0x1000)=nil) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmat(r1, &(0x7f0000217000/0x1000)=nil, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x450, 0xd0, 0x270, 0xd0, 0x0, 0x1d0, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x3b8, 0x6, &(0x7f00000004c0), {[{{@ip={@rand_addr=0x64010100, @remote, 0xff000000, 0xffffffff, 'macvlan1\x00', 'wlan1\x00', {}, {0xff}, 0x2e, 0x3, 0x51}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x81, 0xd, [0x37, 0x20, 0x24, 0x1e, 0x37, 0x1e, 0x5, 0x15, 0x24, 0x37, 0xf, 0x28, 0xc, 0x29, 0x2f, 0x39], 0x1, 0x2, 0x9}}}, {{@ip={@local, @dev={0xac, 0x14, 0x14, 0x33}, 0xffffffff, 0xff, 'tunl0\x00', '\x00', {}, {}, 0xc, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}, {0x200, 0x810, 0x0, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x4, 0xa, [0x1a, 0x1f, 0x36, 0xc, 0xf, 0x30, 0x2d, 0x5, 0x24, 0x3, 0x31, 0x1f, 0x2, 0x1, 0x29, 0x1], 0x0, 0x7fffffff, 0xffff}}}, {{@ip={@broadcast, @multicast1, 0xff, 0xffffffff, 'wlan1\x00', 'wg0\x00', {0x5d45c4ea9cd91368}, {}, 0x16, 0x1, 0x4d}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x26, 0x5, @multicast2, 0x4e22}}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x80000001, 0x3ff, @ipv6=@remote, 0x4e20}}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) shmget$private(0x0, 0x1000, 0x800, &(0x7f00001a7000/0x1000)=nil) 14:10:17 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 14:10:17 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000200)=""/200) [ 884.173161][T31628] hugetlbfs: syz-executor.4 (31628): Using mlock ulimits for SHM_HUGETLB is deprecated [ 884.199596][T31631] loop0: detected capacity change from 0 to 1024 14:10:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 14:10:17 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:17 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000006c0)={'batadv_slave_1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000800)={&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r1, @ANYBLOB="00000000000000000000000014000000000000000000000001000000000000000000000014000000000000000000000007000000010000000000000014000000000000000100000001"], 0x68}, 0x0) 14:10:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000440)=@framed={{}, [@call={0x85, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:10:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 884.367326][T31453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:10:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 14:10:17 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:17 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:17 executing program 4: setuid(0xee00) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) 14:10:17 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000000480)) [ 884.611671][T31660] loop0: detected capacity change from 0 to 1024 14:10:17 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, 0x0) 14:10:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, 0x0) 14:10:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:18 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:18 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) 14:10:18 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f00000002c0)) [ 884.954522][T31681] loop0: detected capacity change from 0 to 1024 14:10:18 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xa, 0x0) 14:10:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 885.049777][T31696] ptrace attach of "/root/syz-executor.4"[31694] was attempted by "/root/syz-executor.4"[31696] 14:10:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d02]}) 14:10:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:18 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:18 executing program 1: msgsnd(0x0, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/237}, 0xf5, 0x3, 0x0) 14:10:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000040)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x28, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5b, 0x45}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}}, 0xa1e09d08a0150e5b) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f0000000480)="c5ae7ffe4c9c9e232a5059478a3b457ca8c16ebd733dca735fc2034812cabb3eb9ba91466a9dd35d0754155e08608ad4b3b011e98396f7f2a57e07902e395c8109d411ec4258d676adb011396e17da7f308427f88964a88d014730943a0f6ae0b995fe83c96798298d37b898e83b62485794c26d1dbd7f658cc153af57f8fbf86eff94ea7a0c3a8a028cb6aeee06abc997aa9d13d62512c60843661cb20f2107f2c682fb91f1bf64808de11f5349319297d6c4677f60de", 0xb7}, {&(0x7f0000000700)}], 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) [ 885.290448][T31709] loop0: detected capacity change from 0 to 1024 14:10:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:18 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, 0x0, 0x0) 14:10:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000440)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x63}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:10:18 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000140)=0xffffffffffffffe1, 0x8) [ 885.593297][T31729] loop3: detected capacity change from 0 to 224 14:10:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000240), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:19 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, 0x0, 0x0) [ 885.781595][T31741] loop0: detected capacity change from 0 to 256 14:10:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000005c0)=ANY=[], 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x1, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000240)=0x208, 0x9) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, 0x0, 0x20008004) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x7ff, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 885.828506][T31741] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 885.833547][T31729] loop3: detected capacity change from 0 to 136 14:10:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x2c, 0x17, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x0) 14:10:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)='~', 0x1}], 0x1}, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 14:10:19 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, 0x0, 0x0) 14:10:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:19 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x14}, 0x0, 0x0, &(0x7f0000000280)=""/20) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xd0000, 0x24) getpgid(0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, 0x0, 0x1d03a157d6ec494a) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0x64000000, 0x4, 0xd0e0011, 0x0, 0xc6, 0x1d8, 0x1d8, 0x190, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1=0xe000b000, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', '\x00', {}, {}, 0x1}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x3}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x31f) 14:10:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) [ 886.163071][T31768] loop0: detected capacity change from 0 to 256 14:10:19 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 886.235182][T31768] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 14:10:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x20, 0x0, 0x400, 0x70bd26, 0x25dfdc00, {{}, {@void, @void, @val={0xc, 0x99, {0x8, 0x28}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x24004015}, 0x20004054) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xa1e09d08a0150e5b) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000780)={@broadcast, @multicast1}, &(0x7f00000007c0)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r1, 0x0, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000480)="c5ae7ffe4c9c9e232a5059478a3b457ca8c16ebd733dca735fc2034812cabb3eb9ba91466a9dd35d0754155e08608ad4b3b011e98396f7f2a57e07902e395c8109d411ec4258d676adb011396e17da7f308427f88964a88d014730943a0f6ae0b995fe83c96798298d37b898e83b62485794c26d1dbd7f658cc153af57f8fbf86eff94ea7a0c3a8a028cb6aeee06abc997aa9d13d62512c60843661cb20f2107f2c682fb91f1", 0xa6}, {&(0x7f0000000640)="2a106c0c72a9fa06c1af32d2104dda38d1bd00982d8e88eede2b6d2a41c57c77f58ed704b488dabac16115c2d5575da91d44f6c74d70b74768210f49ece7466de97d1c246e5cc7004e7d4c43ef43163c41c0e4e4c9206b36504b8112f30017ebc10f24b9d54ab2a41001402898f6d48949f116bacc5e20c5806871351a", 0x7d}, {&(0x7f0000000700)="5e3092241f5b1c304fe34b25496fad7cbe5ec1032bded659c1b6a7e614c19de1e56a69b07f36d5926880e0a71dd9cdef99e027b324d238cb0f80aebff80adb227c4e5b01f8426c08fe4bb87383344604bc32bdec249790", 0x57}], 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) [ 886.286896][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 14:10:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x228, 0x0, 0x4, 0xd0e0011, 0xb8, 0xc6, 0x190, 0x1d8, 0x190, 0x190, 0x1d8, 0x3, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', 'vlan0\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) [ 886.433583][T31781] xt_NFQUEUE: number of total queues is 0 14:10:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000440)=@framed={{}, [@call]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:10:19 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 886.580906][T31791] loop3: detected capacity change from 0 to 224 14:10:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 886.660120][T31797] loop0: detected capacity change from 0 to 256 [ 886.681591][T31798] xt_CT: You must specify a L4 protocol and not use inversions on it [ 886.752871][T31797] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 886.763202][T31806] xt_CT: You must specify a L4 protocol and not use inversions on it 14:10:20 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 14:10:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x20, 0x0, 0x400, 0x70bd26, 0x25dfdc00, {{}, {@void, @void, @val={0xc, 0x99, {0x8, 0x28}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x24004015}, 0x20004054) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xa1e09d08a0150e5b) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000780)={@broadcast, @multicast1}, &(0x7f00000007c0)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r1, 0x0, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000480)="c5ae7ffe4c9c9e232a5059478a3b457ca8c16ebd733dca735fc2034812cabb3eb9ba91466a9dd35d0754155e08608ad4b3b011e98396f7f2a57e07902e395c8109d411ec4258d676adb011396e17da7f308427f88964a88d014730943a0f6ae0b995fe83c96798298d37b898e83b62485794c26d1dbd7f658cc153af57f8fbf86eff94ea7a0c3a8a028cb6aeee06abc997aa9d13d62512c60843661cb20f2107f2c682fb91f1", 0xa6}, {&(0x7f0000000640)="2a106c0c72a9fa06c1af32d2104dda38d1bd00982d8e88eede2b6d2a41c57c77f58ed704b488dabac16115c2d5575da91d44f6c74d70b74768210f49ece7466de97d1c246e5cc7004e7d4c43ef43163c41c0e4e4c9206b36504b8112f30017ebc10f24b9d54ab2a41001402898f6d48949f116bacc5e20c5806871351a", 0x7d}, {&(0x7f0000000700)="5e3092241f5b1c304fe34b25496fad7cbe5ec1032bded659c1b6a7e614c19de1e56a69b07f36d5926880e0a71dd9cdef99e027b324d238cb0f80aebff80adb227c4e5b01f8426c08fe4bb87383344604bc32bdec249790", 0x57}], 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) 14:10:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x228, 0x0, 0x4, 0xd0e0011, 0xb8, 0xc6, 0x190, 0x1d8, 0x190, 0x190, 0x1d8, 0x3, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', 'vlan0\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 14:10:20 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:20 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) [ 887.085057][T31824] xt_CT: You must specify a L4 protocol and not use inversions on it 14:10:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 887.159812][T31826] loop3: detected capacity change from 0 to 224 14:10:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x228, 0x0, 0x4, 0xd0e0011, 0xb8, 0xc6, 0x190, 0x1d8, 0x190, 0x190, 0x1d8, 0x3, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', 'vlan0\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 14:10:20 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x20, 0x0, 0x400, 0x70bd26, 0x25dfdc00, {{}, {@void, @void, @val={0xc, 0x99, {0x8, 0x28}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x24004015}, 0x20004054) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xa1e09d08a0150e5b) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000780)={@broadcast, @multicast1}, &(0x7f00000007c0)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r1, 0x0, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000480)="c5ae7ffe4c9c9e232a5059478a3b457ca8c16ebd733dca735fc2034812cabb3eb9ba91466a9dd35d0754155e08608ad4b3b011e98396f7f2a57e07902e395c8109d411ec4258d676adb011396e17da7f308427f88964a88d014730943a0f6ae0b995fe83c96798298d37b898e83b62485794c26d1dbd7f658cc153af57f8fbf86eff94ea7a0c3a8a028cb6aeee06abc997aa9d13d62512c60843661cb20f2107f2c682fb91f1", 0xa6}, {&(0x7f0000000640)="2a106c0c72a9fa06c1af32d2104dda38d1bd00982d8e88eede2b6d2a41c57c77f58ed704b488dabac16115c2d5575da91d44f6c74d70b74768210f49ece7466de97d1c246e5cc7004e7d4c43ef43163c41c0e4e4c9206b36504b8112f30017ebc10f24b9d54ab2a41001402898f6d48949f116bacc5e20c5806871351a", 0x7d}, {&(0x7f0000000700)="5e3092241f5b1c304fe34b25496fad7cbe5ec1032bded659c1b6a7e614c19de1e56a69b07f36d5926880e0a71dd9cdef99e027b324d238cb0f80aebff80adb227c4e5b01f8426c08fe4bb87383344604bc32bdec249790", 0x57}], 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) 14:10:20 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) [ 887.437897][T31840] xt_CT: You must specify a L4 protocol and not use inversions on it 14:10:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:20 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x8, 0x3, 0x228, 0x0, 0x4, 0xd0e0011, 0xb8, 0xc6, 0x190, 0x1d8, 0x190, 0x190, 0x1d8, 0x3, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth0_macvtap\x00', 'vlan0\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x288) 14:10:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@quota}]}) [ 887.634834][T31846] loop3: detected capacity change from 0 to 224 14:10:21 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) [ 887.780830][T31857] xt_CT: You must specify a L4 protocol and not use inversions on it 14:10:21 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:21 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000200)="88001c0000000000c7d1ec9b000000040800780914092a1af9b795000100000101698c8755dfb6d52274036a22976f0053500701be5824026d413f2d5309854d285cff8a1f4c164da70f4f7343e536119ffc134b1289b3289e25125d95a1a93065ff724d49e57a5cb9625685477d6143b857cc272abb12ec58957331be20611001f180cc2af1dc0696", 0x89, 0xe000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x20, 0x0, 0x400, 0x70bd26, 0x25dfdc00, {{}, {@void, @void, @val={0xc, 0x99, {0x8, 0x28}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x24004015}, 0x20004054) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xa1e09d08a0150e5b) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000780)={@broadcast, @multicast1}, &(0x7f00000007c0)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r1, 0x0, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) writev(r2, &(0x7f0000000840)=[{&(0x7f0000000480)="c5ae7ffe4c9c9e232a5059478a3b457ca8c16ebd733dca735fc2034812cabb3eb9ba91466a9dd35d0754155e08608ad4b3b011e98396f7f2a57e07902e395c8109d411ec4258d676adb011396e17da7f308427f88964a88d014730943a0f6ae0b995fe83c96798298d37b898e83b62485794c26d1dbd7f658cc153af57f8fbf86eff94ea7a0c3a8a028cb6aeee06abc997aa9d13d62512c60843661cb20f2107f2c682fb91f1", 0xa6}, {&(0x7f0000000640)="2a106c0c72a9fa06c1af32d2104dda38d1bd00982d8e88eede2b6d2a41c57c77f58ed704b488dabac16115c2d5575da91d44f6c74d70b74768210f49ece7466de97d1c246e5cc7004e7d4c43ef43163c41c0e4e4c9206b36504b8112f30017ebc10f24b9d54ab2a41001402898f6d48949f116bacc5e20c5806871351a", 0x7d}, {&(0x7f0000000700)="5e3092241f5b1c304fe34b25496fad7cbe5ec1032bded659c1b6a7e614c19de1e56a69b07f36d5926880e0a71dd9cdef99e027b324d238cb0f80aebff80adb227c4e5b01f8426c08fe4bb87383344604bc32bdec249790", 0x57}], 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) 14:10:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000440)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:10:21 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 14:10:21 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 888.098672][T31871] loop3: detected capacity change from 0 to 224 [ 888.134342][T31874] loop0: detected capacity change from 0 to 1024 14:10:21 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:21 executing program 4: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) setuid(0xee00) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f000016b000/0x1000)=nil) [ 888.212400][T31874] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:21 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 14:10:21 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="000000a0ebfaf00008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0xc4) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x2000000, [{0x103, 0x9}, {0x800, 0x4}]}, 0x14, 0x3) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010400000000740000"], 0x9, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x1ff, 0x4) sendto$packet(r2, 0x0, 0x0, 0x48900, &(0x7f00000005c0)={0x11, 0x9, r3, 0x1, 0x0, 0x6, @random="eeacda5445e6"}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:10:21 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$VT_ACTIVATE(r0, 0x5410, 0x0) 14:10:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:21 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:21 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}, 0x0) 14:10:21 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) [ 888.660464][T31908] loop0: detected capacity change from 0 to 1024 [ 888.715465][T31908] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') write$evdev(r0, &(0x7f0000000080)=[{}], 0x18) 14:10:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:22 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:22 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:22 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14}}}, 0x30}}, 0x0) [ 889.121833][T31930] loop0: detected capacity change from 0 to 1024 [ 889.194470][T31930] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 [ 890.126642][ T1504] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 890.138298][ C1] IPVS: sed: UDP 127.0.0.1:0 - no destination available [ 892.047921][T31453] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 895.899578][ T10] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 896.052117][T31901] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.059375][T31901] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.826411][ T149] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 900.441218][T31901] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 900.883439][T31901] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 904.746049][T31901] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 904.754962][T31901] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 904.771102][T31901] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 904.784306][T31901] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 905.798304][T31901] netdevsim netdevsim4 netdevsim0: unset [1, 1] type 2 family 0 port 46710 - 0 [ 905.820091][T31901] netdevsim netdevsim4 netdevsim1: unset [1, 1] type 2 family 0 port 46710 - 0 [ 905.833657][T31901] netdevsim netdevsim4 netdevsim2: unset [1, 1] type 2 family 0 port 46710 - 0 [ 905.842841][T31901] netdevsim netdevsim4 netdevsim3: unset [1, 1] type 2 family 0 port 46710 - 0 [ 905.975842][T31910] device bridge_slave_0 left promiscuous mode [ 905.982268][T31910] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.002479][T31901] syz-executor.4 (31901) used greatest stack depth: 21936 bytes left [ 906.065482][T31910] device bridge_slave_1 left promiscuous mode [ 906.071902][T31910] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.081808][T31910] bond0: (slave bond_slave_0): Releasing backup interface [ 906.091010][T31910] bond0: (slave bond_slave_1): Releasing backup interface [ 906.103856][T31910] team0: Port device team_slave_0 removed 14:10:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="000000a0ebfaf00008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0xc4) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x2000000, [{0x103, 0x9}, {0x800, 0x4}]}, 0x14, 0x3) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010400000000740000"], 0x9, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x1ff, 0x4) sendto$packet(r2, 0x0, 0x0, 0x48900, &(0x7f00000005c0)={0x11, 0x9, r3, 0x1, 0x0, 0x6, @random="eeacda5445e6"}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:10:39 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:39 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:39 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:10:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x0) 14:10:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 906.111333][T31910] team0: Port device team_slave_1 removed [ 906.118221][T31910] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 906.127647][T31910] batman_adv: batadv0: Removing interface: batadv_slave_1 14:10:39 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000025c0)=[{&(0x7f0000001680)='\"', 0x1, 0x200000f92}], 0x0, &(0x7f00000017c0)=ANY=[@ANYRESHEX=0x0]) [ 906.238923][T31953] loop0: detected capacity change from 0 to 1024 [ 906.453917][T31953] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:39 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x0, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:40 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 906.851435][T31960] loop3: detected capacity change from 0 to 264192 14:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:40 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 907.128656][T31973] loop0: detected capacity change from 0 to 1024 [ 907.267662][T31973] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b4b, &(0x7f0000000000)) 14:10:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="000000a0ebfaf00008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0xc4) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x2000000, [{0x103, 0x9}, {0x800, 0x4}]}, 0x14, 0x3) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010400000000740000"], 0x9, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x1ff, 0x4) sendto$packet(r2, 0x0, 0x0, 0x48900, &(0x7f00000005c0)={0x11, 0x9, r3, 0x1, 0x0, 0x6, @random="eeacda5445e6"}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:10:40 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:40 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:40 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 907.824365][T32004] loop0: detected capacity change from 0 to 1024 14:10:41 executing program 3: clock_gettime(0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000000)=""/89, 0x59, 0x2) 14:10:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 907.899429][T32004] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:41 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:10:41 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:41 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) [ 908.276168][T32023] loop0: detected capacity change from 0 to 1024 [ 908.314508][T32023] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010000108000000000054000000000000", @ANYRES32=0x0, @ANYBLOB="000000a0ebfaf00008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0xc4) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x2000000, [{0x103, 0x9}, {0x800, 0x4}]}, 0x14, 0x3) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010400000000740000"], 0x9, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0x1ff, 0x4) sendto$packet(r2, 0x0, 0x0, 0x48900, &(0x7f00000005c0)={0x11, 0x9, r3, 0x1, 0x0, 0x6, @random="eeacda5445e6"}, 0x14) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 14:10:41 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:10:41 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}]}, 0x20}], 0x1}, 0x0) 14:10:41 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}]}, 0x20}], 0x1}, 0x0) [ 908.647155][T32051] loop0: detected capacity change from 0 to 1024 [ 908.723417][T32051] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:10:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file1\x00', 0x141042, 0x0) 14:10:42 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:10:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x0, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:10:42 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}]}, 0x20}], 0x1}, 0x0) 14:10:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400), 0x0, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 909.066719][T32069] loop0: detected capacity change from 0 to 1024 14:10:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 909.163177][T32067] ceph: No mds server is up or the cluster is laggy [ 909.193436][T32069] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 [ 909.596832][ T1504] device hsr_slave_0 left promiscuous mode [ 909.623565][ T1504] device hsr_slave_1 left promiscuous mode [ 910.310994][ T1504] bond0 (unregistering): Released all slaves [ 915.657534][T32126] chnl_net:caif_netlink_parms(): no params data found [ 915.734362][T32126] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.742940][T32126] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.754381][T32126] device bridge_slave_0 entered promiscuous mode [ 915.764263][T32126] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.771611][T32126] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.780251][T32126] device bridge_slave_1 entered promiscuous mode [ 915.811021][T32126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 915.824820][T32126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 915.864861][T32126] team0: Port device team_slave_0 added [ 915.873693][T32126] team0: Port device team_slave_1 added [ 915.907055][T32126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 915.914006][T32126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 915.940766][T32126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 915.954094][T32126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 915.961817][T32126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 915.991087][T32126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 916.032784][T32126] device hsr_slave_0 entered promiscuous mode [ 916.040594][T32126] device hsr_slave_1 entered promiscuous mode [ 916.047896][T32126] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 916.055456][T32126] Cannot create hsr debugfs directory [ 916.167778][T32126] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.174857][T32126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 916.182300][T32126] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.189425][T32126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 916.240324][T32126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 916.258349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 916.268885][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.278788][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.288526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 916.303881][T32126] 8021q: adding VLAN 0 to HW filter on device team0 [ 916.315951][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 916.324383][ T8518] bridge0: port 1(bridge_slave_0) entered blocking state [ 916.331468][ T8518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 916.347944][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 916.357102][ T1280] bridge0: port 2(bridge_slave_1) entered blocking state [ 916.364140][ T1280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 916.388996][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 916.397822][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 916.407067][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 916.421245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 916.433537][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 916.445446][T32126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 916.465119][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 916.472785][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 916.490565][T32126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 916.567710][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 916.582320][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 916.595047][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 916.603432][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 916.620382][T32126] device veth0_vlan entered promiscuous mode [ 916.634270][T32126] device veth1_vlan entered promiscuous mode [ 916.641652][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 916.669096][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 916.680771][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 916.693355][T32126] device veth0_macvtap entered promiscuous mode [ 916.707639][T32126] device veth1_macvtap entered promiscuous mode [ 916.727647][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 916.738269][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.748464][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 916.759305][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.770288][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 916.781701][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.792924][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 916.803702][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.814837][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 916.826993][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.838130][T32126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 916.846595][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 916.855146][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 916.863622][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 916.872715][ T8518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 916.884273][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 916.895803][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.906115][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 916.916946][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.928811][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 916.939664][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.950500][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 916.961034][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.972445][T32126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 916.983025][T32126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 916.994836][T32126] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 917.004482][ T8556] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 917.022238][ T8556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 917.129993][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 917.146487][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 917.161377][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 917.207240][ T149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 917.215442][ T149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 917.226989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 917.485985][ T8518] Bluetooth: hci4: command 0x0409 tx timeout [ 919.565786][ T8358] Bluetooth: hci4: command 0x041b tx timeout [ 920.032205][T32471] bridge0: port 2(bridge_slave_1) entered disabled state [ 920.041110][T32471] bridge0: port 1(bridge_slave_0) entered disabled state [ 921.664267][ T8518] Bluetooth: hci4: command 0x040f tx timeout [ 923.806803][ T8358] Bluetooth: hci4: command 0x0419 tx timeout [ 924.502503][T32471] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 924.946051][T32471] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 929.225927][T32472] device bridge_slave_0 left promiscuous mode [ 929.232262][T32472] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.242241][T32472] device bridge_slave_1 left promiscuous mode [ 929.259004][T32472] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.270476][T32472] bond0: (slave bond_slave_0): Releasing backup interface [ 929.279915][T32472] bond0: (slave bond_slave_1): Releasing backup interface [ 929.297389][T32472] team0: Port device team_slave_0 removed [ 929.304756][T32472] team0: Port device team_slave_1 removed [ 929.312024][T32472] batman_adv: batadv0: Removing interface: batadv_slave_0 14:11:02 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x400, 0x8}, 0x40) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ppoll(&(0x7f0000000d40)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 14:11:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:02 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x0, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='[d::]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file1\x00', 0x141042, 0x0) 14:11:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:02 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 929.321766][T32472] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 929.464500][T32487] loop0: detected capacity change from 0 to 1024 14:11:02 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) [ 929.522494][T32484] ceph: No mds server is up or the cluster is laggy 14:11:02 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x0, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:02 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:03 executing program 3: io_setup(0x4e5, &(0x7f0000000080)=0x0) pipe(&(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x2, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 14:11:03 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000006c0000000700000006001a000000000006001b0000000000"], 0x24}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) socketpair(0xf, 0x1, 0x64, &(0x7f0000000000)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, 0x0, 0x0) 14:11:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:11:03 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x0, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:03 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:11:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x9, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) [ 930.270122][T32487] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 930.270122][T32487] 14:11:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002200055bd25a80648c63940d0524fc60100005400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:11:03 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 14:11:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000180), 0x0}, 0x20) 14:11:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:03 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"/1910], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x1000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac141415ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) [ 930.472117][T32534] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 14:11:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:11:03 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:03 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) [ 930.623857][T32542] loop0: detected capacity change from 0 to 1024 14:11:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002200055bd25a80648c63940d0524fc60100005400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 930.790604][T31453] device hsr_slave_0 left promiscuous mode [ 930.823559][T31453] device hsr_slave_1 left promiscuous mode 14:11:04 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:11:04 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) [ 931.086929][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.093254][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 14:11:04 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r3, &(0x7f0000000180), 0x0}, 0x20) 14:11:04 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 931.398946][T32542] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 931.398946][T32542] 14:11:04 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, 0x0, 0x0) 14:11:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:04 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 931.777426][T32580] loop0: detected capacity change from 0 to 1024 [ 931.947724][T31453] bond0 (unregistering): Released all slaves [ 932.041905][T32559] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 932.583195][T32580] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 932.583195][T32580] [ 934.937414][T32597] chnl_net:caif_netlink_parms(): no params data found [ 935.028567][T32597] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.039482][T32597] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.049926][T32597] device bridge_slave_0 entered promiscuous mode [ 935.060015][T32597] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.067644][T32597] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.075300][T32597] device bridge_slave_1 entered promiscuous mode [ 935.109113][T32597] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 935.124387][T32597] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 935.164531][T32597] team0: Port device team_slave_0 added [ 935.173330][T32597] team0: Port device team_slave_1 added [ 935.208030][T32597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 935.215016][T32597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 935.243454][T32597] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 935.257706][T32597] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 935.264652][T32597] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 935.290923][T32597] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 935.337541][T32597] device hsr_slave_0 entered promiscuous mode [ 935.344225][T32597] device hsr_slave_1 entered promiscuous mode [ 935.354252][T32597] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 935.362568][T32597] Cannot create hsr debugfs directory [ 935.472296][T32597] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.479379][T32597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.486801][T32597] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.494312][T32597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.544987][T32597] 8021q: adding VLAN 0 to HW filter on device bond0 [ 935.561196][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 935.571132][ T8358] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.579861][ T8358] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.589373][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 935.602788][T32597] 8021q: adding VLAN 0 to HW filter on device team0 [ 935.617664][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.626078][ T8303] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.633130][ T8303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.645579][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.654186][ T8358] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.661278][ T8358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.687748][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 935.700651][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 935.712792][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 935.723015][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 935.737898][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 935.749428][T32597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 935.769668][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 935.777255][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 935.794406][T32597] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 935.866767][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 935.892300][T32597] device veth0_vlan entered promiscuous mode [ 935.900686][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 935.911849][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 935.920361][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 935.933641][T32597] device veth1_vlan entered promiscuous mode [ 935.943703][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 935.973001][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 935.986744][ T1280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 935.999454][T32597] device veth0_macvtap entered promiscuous mode [ 936.010525][T32597] device veth1_macvtap entered promiscuous mode [ 936.028196][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 936.040073][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.050400][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 936.061016][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.071692][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 936.082913][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.092812][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 936.103313][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.114310][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 936.127270][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.139606][T32597] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 936.149060][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 936.158644][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 936.167799][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 936.176940][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 936.190665][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 936.201407][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.212032][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 936.223007][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.233362][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 936.244865][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.255136][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 936.265863][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.276099][T32597] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 936.287116][T32597] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 936.300404][T32597] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 936.309489][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 936.319016][ T8303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 936.421883][ T1504] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 936.431154][ T1504] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 936.454814][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 936.515193][T18829] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 936.524502][T18829] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 936.538613][ T8358] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 14:11:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="2e00000028000504d25a80648c63940d0324fc6004000f400a003d005a00000037153e370a00018010000000d1bd", 0x2e}], 0x1}, 0x0) 14:11:10 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:10 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid}]}, 0x28}], 0x1}, 0x0) 14:11:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, 0x0, 0x0) 14:11:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002200055bd25a80648c63940d0524fc60100005400a000a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:11:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 936.813176][ T487] loop0: detected capacity change from 0 to 1024 [ 936.846170][ T7894] Bluetooth: hci4: command 0x0409 tx timeout [ 936.869013][ T491] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 936.869478][ T485] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 14:11:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, 0x0, 0x0) 14:11:10 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) 14:11:10 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 936.932623][ T494] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:11:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="1b00000020008108040f80ecdb4cb92e0a480e0037000000e8bd6e", 0x1b}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 14:11:10 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000700)) 14:11:10 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) 14:11:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:11:10 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() sendmsg$unix(r0, &(0x7f0000006700)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000006680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20}, 0x0) 14:11:10 executing program 3: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, 0x0}, 0x78) r0 = socket$kcm(0xa, 0x2, 0x73) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg(r0, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x8dffffff}, 0x80, 0x0}, 0x0) 14:11:10 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) [ 937.619848][ T487] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 937.619848][ T487] 14:11:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:11:11 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0xa, 0x8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:11:11 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) 14:11:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_buf(r0, 0x29, 0x2a, &(0x7f0000000080)="61c45d6a657bf5cdb071c3e650f81e124444ca3f3ff9bdcac863d9ff832c3ddd96d1be6ba775702e0aa24ec2f2120229847f4e0b06a1a3d815ce14c29c1d9a0e001a2156d21e1e0dc852ba8daea17e192bfce090c9377d95e8818a03630360037fca504d061c6d304902fdda5b4cb7be75c01b2af838204a2b5ee980af31969bed042034559cfdd2", 0x88) 14:11:11 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 14:11:11 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) 14:11:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), 0x0}, 0x20) 14:11:11 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x0, 0x0, 0xf, 0x0, 0x388}, 0x20) [ 937.969840][ T543] loop0: detected capacity change from 0 to 1024 14:11:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, &(0x7f000000c3c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x21, 0x0, 0x201328}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000006380)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x18}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x441, 0x0) write$FUSE_GETXATTR(r2, &(0x7f0000000140)={0x18}, 0x18) syz_fuse_handle_req(r0, &(0x7f0000008380)="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", 0x2000, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x18, 0x0, 0x0, {0x1000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 938.124926][ T556] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 938.749133][ T543] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 938.749133][ T543] 14:11:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:12 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, 0x0, 0x0}, 0x20) 14:11:12 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x20, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x20}], 0x1}, 0x0) 14:11:12 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:12 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) select(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000002880), 0x0, 0x0) dup2(r1, r0) 14:11:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x20) [ 938.925769][ T7894] Bluetooth: hci4: command 0x041b tx timeout 14:11:12 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:12 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'macvlan1\x00', @ifru_ivalue}}) 14:11:12 executing program 1: mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)=ANY=[@ANYBLOB="0289"]) 14:11:12 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, 0x0, 0x0}, 0x20) [ 939.133670][ T588] loop0: detected capacity change from 0 to 1024 14:11:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r0, 0x29, 0x16, 0x0, 0x0) [ 939.911434][ T588] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 939.911434][ T588] 14:11:13 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:13 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 14:11:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:13 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r4, 0x0, 0x0}, 0x20) 14:11:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x7fff}, 0x1c) 14:11:13 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 14:11:13 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:13 executing program 5: socket(0x200000000000011, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x8001, 0x89d, 0x2}, 0x40) socket(0x10, 0x803, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)={0x28, 0x13, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x4, 0x0, 0x0, @pid=r1}]}, 0x28}], 0x1}, 0x0) 14:11:13 executing program 3: io_setup(0x8001, &(0x7f0000000040)) [ 940.228415][ T623] loop0: detected capacity change from 0 to 1024 14:11:13 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)={[{@size={'size', 0x3d, [0x25]}}]}) 14:11:13 executing program 2: socketpair(0xa, 0x0, 0xdc6, 0x0) 14:11:13 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:13 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0xd0, 0x80a00) 14:11:13 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000200)={'IDLETIMER\x00'}, &(0x7f0000000240)=0x1e) [ 940.996396][ T623] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 940.996396][ T623] [ 941.009860][ T7894] Bluetooth: hci4: command 0x040f tx timeout 14:11:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)) 14:11:14 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) 14:11:14 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/user\x00') setns(r0, 0x10000000) 14:11:14 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 14:11:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000000)='Z') 14:11:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) getsockname$inet6(r0, 0x0, &(0x7f0000000040)) 14:11:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 941.340641][ T672] loop0: detected capacity change from 0 to 1024 14:11:14 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:14 executing program 2: clone(0x13048100, 0x0, 0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 14:11:14 executing program 3: clone(0x13048100, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='+-\x00', 0x0) keyctl$clear(0x7, r0) [ 942.149739][ T672] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 942.149739][ T672] 14:11:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:15 executing program 5: socket$inet6_udplite(0x2, 0x5, 0x6) 14:11:15 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000540)) 14:11:15 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040), 0x6) 14:11:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000280)=0xb, 0x4) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000900)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={0x0}}, 0x0) 14:11:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000300)={'security\x00'}, &(0x7f0000000380)=0x54) 14:11:15 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000000)=0x8, 0x4) 14:11:15 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000380)=""/4096, &(0x7f0000001380)=0x1000) [ 942.491924][ T718] loop0: detected capacity change from 0 to 1024 14:11:15 executing program 4: io_setup(0xffff, &(0x7f0000000040)=0x0) io_destroy(r0) 14:11:15 executing program 5: r0 = epoll_create1(0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffeff, 0x0, 0x4d) [ 943.087510][ T8358] Bluetooth: hci4: command 0x0419 tx timeout 14:11:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x95, 0x0, 0x0, 0x0, 0x0, "8a96f5954ed058a5b6ceff2e5a730865060000000000000056eb266168bb83c936e8b95ea5346af771ff4352330fe4abfa25b27f0c7211f5a2b7a6e5b94ebb59", "c90906a1f8c97831a01ac7826bef5f437ed34a604735e6663242b05e6ac472c8c2f95fc15c893679eeab0df398e85168f8dd904c4bec5c2bb19c95a08aa5231f", "069f7702ac955fbc51bdb933fc2049fcbe389b8fa67ae0dde85b7a2f325d82db"}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200180, 0x0) 14:11:16 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:16 executing program 2: clone(0x13c255d00, 0x0, 0x0, 0x0, 0x0) 14:11:16 executing program 4: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x20080) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @local}, {0x1, @broadcast}, 0x10, {0x2, 0x4e23, @local}, 'veth1_to_bridge\x00'}) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000080)=0x2802, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x40800, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendfile(r1, r2, 0x0, 0x101000001) [ 943.306167][ T718] EXT4-fs warning (device loop0): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 943.306167][ T718] 14:11:16 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x3b, 0x0, 0x0) 14:11:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000003d80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10040, 0x0) [ 943.520715][ T751] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 943.595932][ T763] loop0: detected capacity change from 0 to 1024 14:11:16 executing program 5: r0 = epoll_create1(0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffeff, 0x0, 0x4d) [ 943.653421][ T763] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:11:17 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, 0x0) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:17 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 14:11:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000100)) 14:11:17 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000740)={0x2020}, 0x2020) dup(0xffffffffffffffff) 14:11:17 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, 0x0) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:17 executing program 2: clone(0x13048100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000340)='rxrpc\x00', 0xfffffffffffffffd) [ 943.985510][ T782] loop0: detected capacity change from 0 to 1024 14:11:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x8, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 944.062719][ T782] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:11:17 executing program 3: clone(0x83148900, 0x0, 0x0, 0x0, 0x0) 14:11:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:17 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, 0x0) madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 944.383985][ T811] loop0: detected capacity change from 0 to 1024 [ 944.431702][ T811] EXT4-fs warning (device loop0): read_mmp_block:106: Error -117 while reading MMP block 64 14:11:18 executing program 5: r0 = epoll_create1(0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffeff, 0x0, 0x4d) 14:11:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) recvfrom$inet6(r0, 0x0, 0x0, 0x2001, 0x0, 0x0) 14:11:18 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x0, 0x2}, 0x6) 14:11:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x1, 0x0, 0xf}, 0x20) 14:11:18 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 944.816617][ T831] loop0: detected capacity change from 0 to 1024 14:11:18 executing program 2: io_setup(0x100, &(0x7f0000000040)=0x0) io_destroy(r0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:11:18 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x8}, 0x10}}, 0x0) 14:11:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 14:11:18 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 944.901647][ T831] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 944.926598][ T831] EXT4-fs (loop0): get root inode failed [ 944.932297][ T831] EXT4-fs (loop0): mount failed 14:11:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:18 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) [ 945.278477][ T853] loop0: detected capacity change from 0 to 1024 [ 945.331704][ T853] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 945.364131][ T853] EXT4-fs (loop0): get root inode failed [ 945.375772][ T853] EXT4-fs (loop0): mount failed 14:11:19 executing program 5: r0 = epoll_create1(0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffeff, 0x0, 0x4d) 14:11:19 executing program 4: clone(0x10d3cbb00, 0x0, 0x0, 0x0, 0x0) 14:11:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xa) getsockopt$inet6_int(r0, 0x29, 0x3, 0x0, &(0x7f0000000080)) 14:11:19 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0x0, 0x0) 14:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 945.834241][ T878] loop0: detected capacity change from 0 to 1024 14:11:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 14:11:19 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000100)) 14:11:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r0, 0x29, 0x11, 0x0, 0x0) [ 945.917271][ T878] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 945.947659][ T878] EXT4-fs (loop0): get root inode failed [ 945.957129][ T878] EXT4-fs (loop0): mount failed 14:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, 0x0, &(0x7f0000000080)) [ 946.314651][ T902] loop0: detected capacity change from 0 to 1024 [ 946.372323][ T902] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 946.391283][ T902] EXT4-fs (loop0): get root inode failed [ 946.402851][ T902] EXT4-fs (loop0): mount failed 14:11:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:19 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) sendmmsg$inet6(r0, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x81) 14:11:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xa) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f00000000c0)) 14:11:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0xf, 0x0, &(0x7f0000000000)) 14:11:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@private1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x50, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@broadcast}, 0x0, @in=@remote}}, 0xe8) 14:11:20 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 946.815234][ T927] loop0: detected capacity change from 0 to 1024 14:11:20 executing program 4: r0 = inotify_init() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002b00)='/proc/vmallocinfo\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 14:11:20 executing program 3: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac"], 0x44}}, 0x0) 14:11:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:20 executing program 5: r0 = creat(&(0x7f0000000700)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x200400, 0x0) fcntl$dupfd(r1, 0x0, r0) [ 946.914688][ T927] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 946.947169][ T927] EXT4-fs (loop0): get root inode failed [ 946.952915][ T927] EXT4-fs (loop0): mount failed 14:11:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:20 executing program 2: clone(0x78820180, 0x0, 0x0, 0x0, 0x0) 14:11:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:20 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r0) socketpair(0x11, 0x3, 0x8, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000280)=0x7fff, 0x4) socket$nl_audit(0x10, 0x3, 0x9) 14:11:20 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) 14:11:20 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x1) openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x32) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1"], 0x44}}, 0x0) [ 947.370872][ T954] loop0: detected capacity change from 0 to 1024 14:11:20 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 947.454478][ T954] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 947.498778][ T954] EXT4-fs (loop0): get root inode failed [ 947.522865][ T954] EXT4-fs (loop0): mount failed 14:11:20 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x0, @none}, &(0x7f0000000280)=0xe, 0x80000) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/124, 0x7c}], 0x1, 0xff, 0x0) r3 = openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x32) sendfile(r3, r0, &(0x7f00000003c0)=0x7631, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17"], 0x44}}, 0x0) 14:11:20 executing program 3: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x29, @broadcast, 0x0, 0x0, 'nq\x00', 0x0, 0x8001, 0x52}, 0x2c) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000180)={0x1f, 0x0, @none}, 0x0, 0x0) preadv(r1, &(0x7f0000000340), 0x0, 0xff, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd5346800"], 0x44}}, 0x0) 14:11:20 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = accept4$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x0, @none}, &(0x7f0000000280)=0xe, 0x80000) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/124, 0x7c}], 0x1, 0xff, 0x1) r3 = openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x32) sendfile(r3, r0, &(0x7f00000003c0)=0x7631, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad7"], 0x44}}, 0x0) 14:11:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:21 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:21 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x29, @broadcast, 0x4e23, 0x0, 'nq\x00', 0x20, 0x8001, 0x52}, 0x2c) r2 = accept4$bt_l2cap(r0, &(0x7f0000000180)={0x1f, 0x0, @none}, &(0x7f0000000280)=0xe, 0x80000) preadv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/124, 0x7c}], 0x1, 0xff, 0x1) r3 = openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x32) sendfile(r3, r0, &(0x7f00000003c0)=0x7631, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad7"], 0x44}}, 0x0) [ 947.963342][ T1020] loop0: detected capacity change from 0 to 1024 [ 948.073532][ T1020] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 948.086586][ T1020] EXT4-fs (loop0): get root inode failed [ 948.092383][ T1020] EXT4-fs (loop0): mount failed 14:11:25 executing program 2: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad76ef97585de68d533947e"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 14:11:25 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x185) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x0, 0x0, {0x0, 0x0, 0x6}}], {0x14}}, 0x88}}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020}, 0x2020) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000000)={@desc={0x1, 0x0, @desc1}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002880)={&(0x7f00000004c0)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x14) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080000010) 14:11:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/131, 0x1a, 0x83, 0x1}, 0x20) 14:11:25 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 14:11:25 executing program 3: clock_adjtime(0x0, &(0x7f0000000200)={0x33f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x995, 0x0, 0x0, 0x80, 0x1000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffff, 0x7fff, 0x9}) 14:11:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 951.875543][ T1074] loop0: detected capacity change from 0 to 1024 14:11:25 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad76ef97585de68d533947e33e33263d9aeff6dfbff81e9252dedaa8198fec431a37f2db307156810857ade998d76cfca46601d3f142a531938859fb5478c5bcdde8f5fedb84ea28367851dd964595c2d591d2e56aa6d88ffe001eb0a285698f350da3a8be305c692849d0536f143b8b304f5"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 14:11:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/124, 0x7c}], 0x1, 0xff, 0x1) r2 = openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x32) sendfile(r2, r0, &(0x7f00000003c0)=0x7631, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1"], 0x44}}, 0x0) [ 951.985280][ T1074] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 952.009122][ T1074] EXT4-fs (loop0): get root inode failed 14:11:25 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) [ 952.032025][ T1074] EXT4-fs (loop0): mount failed 14:11:25 executing program 2: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad76ef97585de68d533947e"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 14:11:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2f"], 0x44}}, 0x0) 14:11:25 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) [ 952.458655][ T1104] loop0: detected capacity change from 0 to 1024 [ 952.523915][ T1104] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 952.524043][ T1104] EXT4-fs (loop0): get root inode failed [ 952.524059][ T1104] EXT4-fs (loop0): mount failed 14:11:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800007, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x185) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x9, 0x0, 0x0, {0x0, 0x0, 0x6}}], {0x14}}, 0x88}}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000600)={0x2020}, 0x2020) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000000)={@desc={0x1, 0x0, @desc1}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002880)={&(0x7f00000004c0)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x14) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080000010) 14:11:26 executing program 5: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000fee000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/171) 14:11:26 executing program 2: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad76ef97585de68d533947e"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 14:11:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 14:11:26 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, 0x0, 0x0) 14:11:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f465", 0xf, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 953.109573][ T1140] loop0: detected capacity change from 0 to 1024 14:11:26 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x91) 14:11:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 953.211917][ T1140] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 953.273683][ T1140] EXT4-fs (loop0): get root inode failed 14:11:26 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, 0x0, 0x0) 14:11:26 executing program 2: ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r1, 0xffffffffffffffff, 0x0, 0x5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000017000101000000e27e0000000400000e300011003538eb0933094f411f81d7895fdb41aa2fd534680000e746f464995203a1526a1eb4ced0b9ac9d46cca62e17f00bbad76ef97585de68d533947e"], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) [ 953.355340][ T1140] EXT4-fs (loop0): mount failed 14:11:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) 14:11:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f465", 0xf, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 953.758879][ T1173] loop0: detected capacity change from 0 to 1024 [ 953.803772][ T1173] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 953.803890][ T1173] EXT4-fs (loop0): get root inode failed [ 953.803907][ T1173] EXT4-fs (loop0): mount failed 14:11:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/189, 0xbd}, {&(0x7f0000000100)=""/179, 0xb3}], 0x2, 0x0, 0x0) 14:11:28 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000c2f000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f000040a000/0x4000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000002480)='maps\x00') madvise(&(0x7f0000feb000/0x2000)=nil, 0x2000, 0xe) mremap(&(0x7f0000d18000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f000077e000/0x3000)=nil) madvise(&(0x7f00008fe000/0x2000)=nil, 0x2000, 0xf) munlock(&(0x7f0000a85000/0x2000)=nil, 0x2000) read$FUSE(r0, 0x0, 0x0) 14:11:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1932) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) 14:11:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:11:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f465", 0xf, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 955.164128][ T1197] loop0: detected capacity change from 0 to 1024 14:11:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, 0x0, 0x0) 14:11:28 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1932) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) [ 955.356505][ T1197] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated 14:11:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:11:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_QUEUE_MAXLEN={0x8}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x3ff, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x30}}, 0x0) [ 955.429840][ T1197] EXT4-fs (loop0): get root inode failed [ 955.444381][ T1197] EXT4-fs (loop0): mount failed 14:11:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:11:28 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "222da71f29bdf8a3542f9dda8f1d45cc9c91bf4cc5a87db2aa0478e45a08be79b3598512de0d647e3e4a18915e4cfdbcb07dc00b9bea3020f7148b58847879ea"}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r0) 14:11:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000", 0x16, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:29 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) socket$kcm(0x2, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1932) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) 14:11:29 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "b9363ebd228c4341"}) 14:11:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002c80)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}}], 0x1, 0x0) [ 955.876360][ T1229] loop0: detected capacity change from 0 to 1024 14:11:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 956.062119][ T1229] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated 14:11:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=/:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) ftruncate(r1, 0x200004) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x0, 0x2, 0xca, 0x0, 0x8001, 0x8000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x7, 0x71}, 0x80800, 0x3ebd, 0x6d, 0xf, 0x9, 0x4, 0x3ff, 0x0, 0x1, 0x0, 0x1ff}, 0xffffffffffffffff, 0x5, r1, 0x3) lseek(r0, 0x400000000000002, 0x0) getdents64(r0, 0x0, 0xffffffffffffff7f) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:11:29 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) [ 956.145522][ T1229] EXT4-fs (loop0): get root inode failed 14:11:29 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2800) [ 956.223815][ T1229] EXT4-fs (loop0): mount failed 14:11:29 executing program 1: semctl$GETZCNT(0xffffffffffffffff, 0x0, 0x7, 0x0) getrusage(0x0, &(0x7f00000000c0)) 14:11:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000", 0x16, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:29 executing program 2: poll(&(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x0) 14:11:29 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$inet(r0, 0x0, 0x0) 14:11:30 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 14:11:30 executing program 1: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, 0x0) 14:11:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x0, 0x10}, &(0x7f0000000100)=0x18) [ 956.729337][ T1267] loop0: detected capacity change from 0 to 1024 14:11:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0e9b0807340061"], 0x40) 14:11:30 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2}, 0x80, 0x0}, 0x0) [ 956.820060][ T1267] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 956.854949][ T1267] EXT4-fs (loop0): get root inode failed [ 956.873820][ T1267] EXT4-fs (loop0): mount failed 14:11:30 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000005380)={0x1, &(0x7f0000005300)=[{0x3, 0x0, 0x0, 0x7fffffff}]}) 14:11:30 executing program 3: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r0 = fork() r1 = fork() tkill(r1, 0x5) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, &(0x7f0000000040)) 14:11:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 14:11:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000", 0x16, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:30 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x39) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x3f0, 0xe8, 0xe8, 0x0, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0\x00', 'rose0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@link_local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="8a731941edbb", @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 14:11:30 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) 14:11:30 executing program 5: setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x121005) write$binfmt_misc(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xab) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000140)={0x8, 'veth0_to_team\x00', {'rose0\x00'}, 0x7fff}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000080)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x110, r1, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) tkill(0x0, 0x1d) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x15) 14:11:30 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000008f00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000009700)={0x0, 0x0, &(0x7f0000009580)=[{&(0x7f0000008fc0)=""/11, 0xb}], 0x1}, 0x0) [ 957.227414][ T1299] loop0: detected capacity change from 0 to 1024 [ 957.318019][ T1305] x_tables: duplicate underflow at hook 1 [ 957.332970][ C0] sd 0:0:1:0: [sg0] tag#3982 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 957.343414][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB: Test Unit Ready [ 957.349923][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.359962][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.369664][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.379266][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.388862][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.398459][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.408061][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.417662][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.427278][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.436874][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.446479][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.456075][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:11:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x7d, 0x0, &(0x7f0000002000)) [ 957.465672][ C0] sd 0:0:1:0: [sg0] tag#3982 CDB[c0]: 00 00 00 00 00 00 00 00 [ 957.485886][ T1317] x_tables: duplicate underflow at hook 1 [ 957.628012][ T1299] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 957.650299][ T1299] EXT4-fs (loop0): get root inode failed [ 957.673033][ T1299] EXT4-fs (loop0): mount failed 14:11:31 executing program 2: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x5}) 14:11:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @link_local}, 0x0, {0x2, 0x0, @empty}, 'sit0\x00'}) 14:11:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 957.895891][ C1] sd 0:0:1:0: [sg0] tag#3983 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 957.906379][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB: Test Unit Ready [ 957.912825][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.922462][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.932087][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.941722][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.951388][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.961017][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.970682][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.980338][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:11:31 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) read(r3, &(0x7f0000000340)=""/254, 0xfe) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000622c, 0x0) [ 957.989968][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 957.999671][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.009295][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.018914][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.028543][ C1] sd 0:0:1:0: [sg0] tag#3983 CDB[c0]: 00 00 00 00 00 00 00 00 14:11:31 executing program 5: setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x121005) write$binfmt_misc(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xab) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000140)={0x8, 'veth0_to_team\x00', {'rose0\x00'}, 0x7fff}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000080)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x110, r1, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) tkill(0x0, 0x1d) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x15) [ 958.105772][ T1333] loop0: detected capacity change from 0 to 1024 14:11:31 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000340), &(0x7f0000000380)={'fscrypt:', @desc3}, &(0x7f00000003c0)={0x0, "1299450e6b486640923cb38be80f8883c1eea0c3ab6b8a2070c3612f30636bd2447d724fbb2fb4f03b96cbd1be5597721fe0bb84f25b698a710a11301e476d24"}, 0x48, r1) keyctl$set_timeout(0xf, r2, 0xdf9) 14:11:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x74000000) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) [ 958.257031][ T1333] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 958.297124][ T1333] EXT4-fs (loop0): get root inode failed [ 958.306193][ T1333] EXT4-fs (loop0): mount failed 14:11:31 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000700)) [ 958.338184][ T1344] netlink: 1328 bytes leftover after parsing attributes in process `syz-executor.2'. 14:11:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mlockall(0x2) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) [ 958.634935][ C1] sd 0:0:1:0: [sg0] tag#3984 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 958.645463][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB: Test Unit Ready [ 958.651896][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.661536][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.671169][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.680790][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.690421][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.700146][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.709753][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.719353][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:11:31 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x39) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x600, 0x48c, 0x0, 0x0) [ 958.728961][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.738566][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.748173][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.757789][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 958.767400][ C1] sd 0:0:1:0: [sg0] tag#3984 CDB[c0]: 00 00 00 00 00 00 00 00 14:11:32 executing program 5: setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x121005) write$binfmt_misc(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="5300000044a6aeabc81e152000000000e4ffff0f3605f64017db9820000000000000d403ffff635427e59aa146175dd106736d173f0fc7ec58000000000000000081baf9459c5c953948c6801f2c0945c08ba8000063a324016f7b7fa4981ffc99a7422007653872ecb4f63adb415ccdfe808101000100000000004f2a88d2fbea75e16a61fd063f026ed7360627ec60cb274e00da971f7ee096d74c92fad7e379860fc0794bd5092d45cc36c2440eac2d224609aba9e600000000128ef922502a34290365194a47871a079242514ddb61c548aa5f6486b1aa16690cfe6cddd6d2ded32ba6f9bb47f852571169876a0fe8c3964fcfbfc15f2f6c99effef33d978b92ba486d865533eb6f6f8e6e5bb5efb4653e851650c9ba28efbbc31677fd36fc0ecf1ce083c57397d968fbe6c455af92c9bc869899fa0ef7e2dd94e3f1ca872991f0e514e443222d891494bf1aaf15d8a716f80fcfe7cc604473ae468352dc4bf084650aa6abb001590a7f7e4a84aca8685aadb7022ead1ed92365e1aa9ee4940ade25cdfd17e7bda3297154a6ad12c2f5360c39f23d3e9b09320d1b7214cf5661dc97276350ca622c887303de8756eb38392e8711bed631bf0fd2a7e9f8f40923bdf90bde62599891699f45c5d3233b55e6f9c7646b5080947643cbd76f04b153dfa4023d0b45a8e18e9cc0a9e6cfab96a21375f94b1f214d1e1c2f0b140bc269baf684b39218983649f262063e5b89c5984e3e9f1984a48e29966b784c8af5d7f122a69cc8e699bbaa9fb19245a0ea087c0a6b624562c8bfcf038739cb7d8b5f821adfb34b0e670f9f3424a07f62bb232ebb082e6dd24ee2cedf11e93ef24ce1fd13bce9f07f3b5a631202f6efd4a4e382608f6aed8dcbc8fa52feb2c4de8a1ea1f3b9fe23a77b10b283a786c723e9f65b845f8fab3e317f95a57b2669cd1a01cd31d2d8e6e76bd41a7f0de5441916d7f8a6d12bad7964a3e3d6a370c39272b78e8c2159089ec2c44495d903753bbcb487f082290738f58d9a2c88637ce75b5fa79a139b91ef8d0238640d248a263c326669e068fdcfad7f5ceff96694ae3d1acd7277ee1a5ff22c66f1e3f4826a56f9cbc3818cc2d5793fc42643f5649bc34d4a718c59d117fe85105d07f014391ae50c513eacf8e7aa172cdd8b1e398f82522c1851ea3d18867d39680efff4653112065f6b2e0ad093cccb87c20871a8e8aebb9501d443a36a8dce884ff657bf904f91b9917f64ebcc6051c08fde5a4ebd1bff65b82e3cffc60dc2ab9b931293f75192c9692cc983591adbf9b2835467be46f22c80f7d16ef42455299a37cefe48ac4234c8b50df2000000000000"], 0xab) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000140)={0x8, 'veth0_to_team\x00', {'rose0\x00'}, 0x7fff}) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000080)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x110, r1, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) tkill(0x0, 0x1d) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x15) 14:11:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0b0400000000000000000a00000008000300", @ANYRES32=r2, @ANYBLOB="10005080050002"], 0x2c}}, 0x0) 14:11:32 executing program 4: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_usb_connect$cdc_ecm(0x2, 0x65, &(0x7f0000000080)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x53, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x3, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x8, 0x81}, [@network_terminal={0x7, 0x24, 0xa, 0x1, 0x0, 0x20, 0x80}, @acm={0x4, 0x24, 0x2, 0x7}, @country_functional={0x6, 0x24, 0x7, 0x9}, @dmm={0x7, 0x24, 0x14, 0xf28, 0x9}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x7, 0x0, 0x5}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x0, 0x0, 0x1}}}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x201, 0x0, 0x6, 0x2, 0x40, 0x4}, 0x5, &(0x7f0000000540)=ANY=[], 0x1, [{0x0, 0x0}]}) [ 959.075466][ T1367] netlink: 1328 bytes leftover after parsing attributes in process `syz-executor.2'. [ 959.308945][ C1] sd 0:0:1:0: [sg0] tag#3985 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 959.319437][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB: Test Unit Ready [ 959.325963][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.335571][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.345173][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.354790][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.364414][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.374049][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.383670][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.393300][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.402923][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.412539][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.422158][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.431775][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 959.441391][ C1] sd 0:0:1:0: [sg0] tag#3985 CDB[c0]: 00 00 00 00 00 00 00 00 [ 959.511372][ T8303] usb 5-1: new full-speed USB device number 15 using dummy_hcd 14:11:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) [ 959.644098][ T1372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:11:33 executing program 5: shmctl$SHM_LOCK(0x0, 0xb) shmctl$IPC_RMID(0x0, 0x0) [ 959.692762][ T1384] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:11:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x80000}, 0x9c) 14:11:33 executing program 1: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x4000001) syz_io_uring_setup(0x4a23, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={0x0}}, 0x0) syz_usb_connect$cdc_ecm(0x2, 0x54, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x42, 0x1, 0x1, 0x0, 0x90, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x8, 0x81, 0xe0}, [@network_terminal={0x7, 0x24, 0xa, 0x0, 0x0, 0x20}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0xb7}}}}}]}}]}}, 0x0) [ 959.791615][ T1386] loop0: detected capacity change from 0 to 1024 [ 959.846327][ T1386] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 959.927396][ T1386] EXT4-fs (loop0): get root inode failed 14:11:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x5428, 0x0) [ 959.971615][ T8303] usb 5-1: unable to get BOS descriptor or descriptor too short [ 959.986807][ T1386] EXT4-fs (loop0): mount failed [ 960.023753][ T8303] usb 5-1: not running at top speed; connect to a high speed hub [ 960.131444][ T8303] usb 5-1: config 1 interface 0 altsetting 3 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 960.150621][ T8303] usb 5-1: config 1 interface 0 has no altsetting 0 [ 960.324358][ T1280] usb 2-1: new full-speed USB device number 14 using dummy_hcd [ 960.420989][ T8303] usb 5-1: string descriptor 0 read error: -22 [ 960.427254][ T8303] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 960.445903][ T8303] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 960.494032][ T8303] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 960.732759][ T1280] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 960.798859][ T8303] usb 5-1: USB disconnect, device number 15 [ 960.962896][ T1280] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 960.982022][ T1280] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 961.010513][ T1280] usb 2-1: Product: syz [ 961.026019][ T1280] usb 2-1: Manufacturer: syz [ 961.037886][ T1280] usb 2-1: SerialNumber: syz [ 961.090746][ T1280] cdc_ether: probe of 2-1:1.0 failed with error -22 14:11:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x74000000) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) 14:11:34 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1b6) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x101b2, 0x0) 14:11:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @remote, 0x200}, 0x3f) 14:11:34 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 14:11:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x74000000) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) [ 961.383356][ T1432] loop0: detected capacity change from 0 to 1024 [ 961.399648][ T1280] usb 2-1: USB disconnect, device number 14 [ 961.494515][ T1432] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 961.507519][ T1432] EXT4-fs (loop0): get root inode failed [ 961.514380][ T1432] EXT4-fs (loop0): mount failed 14:11:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)) 14:11:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:35 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x5386, &(0x7f0000000080)) 14:11:35 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 14:11:35 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)) [ 961.821306][ T1463] loop0: detected capacity change from 0 to 1024 14:11:35 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x40045613, &(0x7f0000000280)={0xc00, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "00c75dce"}, 0x0, 0x0, @planes=0x0}) [ 961.891618][ T1463] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 961.907256][ T1463] EXT4-fs (loop0): mount failed 14:11:37 executing program 3: gettid() r0 = fork() ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x20008840) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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"/3584, 0xe00) fallocate(r3, 0x11, 0x0, 0xfffc) sendfile(r3, r4, 0x0, 0x11f08) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=0x0) tkill(r5, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x1152b000) chdir(&(0x7f0000000180)='./file1\x00') syz_open_procfs(0x0, 0x0) 14:11:37 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "834b1709"}, 0x0, 0x1, @fd}) 14:11:37 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 14:11:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:37 executing program 5: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0x4020940d, &(0x7f0000000280)={0x3, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5a5af7e5"}, 0x0, 0x0, @planes=0x0}) 14:11:37 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x1c}}, 0x0) 14:11:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x64, 0x0, 0x98) [ 964.536937][ T1506] loop0: detected capacity change from 0 to 1024 14:11:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x410001, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x38) 14:11:37 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x14, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106309, 0x0, 0x7}], 0x0, 0x0, 0x0}) [ 964.639208][ T1506] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 964.645855][ T1506] EXT4-fs (loop0): mount failed 14:11:38 executing program 5: gettid() r0 = fork() ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x6000}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x20008840) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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"/3584, 0xe00) fallocate(0xffffffffffffffff, 0x11, 0x0, 0xfffc) sendfile(r3, r4, 0x0, 0x11f08) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=0x0) tkill(r5, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x1152b000) chdir(&(0x7f0000000180)='./file1\x00') syz_open_procfs(0x0, 0x0) [ 964.690361][ T26] audit: type=1800 audit(1628259097.998:60): pid=1505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15219 res=0 errno=0 14:11:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)) 14:11:38 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 965.077225][ T26] audit: type=1800 audit(1628259098.388:61): pid=1533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=15226 res=0 errno=0 [ 965.138657][ T26] audit: type=1804 audit(1628259098.438:62): pid=1505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir270668686/syzkaller.U69j6v/903/file0" dev="sda1" ino=15219 res=1 errno=0 [ 965.196734][ T26] audit: type=1804 audit(1628259098.498:63): pid=1533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir740165529/syzkaller.f65UCY/1109/file0" dev="sda1" ino=15226 res=1 errno=0 14:11:39 executing program 3: gettid() r0 = fork() ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) fcntl$getownex(r1, 0x10, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x20008840) r3 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000001400)="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"/3584, 0xe00) fallocate(r3, 0x11, 0x0, 0xfffc) sendfile(r3, r4, 0x0, 0x11f08) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=0x0) tkill(r5, 0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x1152b000) chdir(&(0x7f0000000180)='./file1\x00') syz_open_procfs(0x0, 0x0) 14:11:39 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40c82) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) 14:11:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:39 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000400)='D'}) 14:11:39 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) 14:11:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x8, @dev={0xac, 0x14, 0x14, 0x41}}], 0x10) [ 965.932423][ T1567] loop0: detected capacity change from 0 to 1024 14:11:39 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x1276, 0x0) 14:11:39 executing program 2: r0 = openat$nvram(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) setresuid(0xee01, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x3, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e0) 14:11:39 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40c82) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) [ 966.141923][ T1567] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 966.155704][ T1567] EXT4-fs (loop0): mount failed [ 966.244724][ T1582] Cannot find add_set index 0 as target [ 966.298292][ T1585] Cannot find add_set index 0 as target 14:11:39 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000013c0), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x1d}, 0x0, 0x0, 0x0, 0x0) 14:11:39 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40c82) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) 14:11:39 executing program 2: r0 = openat$nvram(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) setresuid(0xee01, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x3, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e0) [ 966.404443][ T26] audit: type=1800 audit(1628259099.709:64): pid=1571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=13939 res=0 errno=0 [ 966.529572][ T1593] Cannot find add_set index 0 as target [ 966.645279][ T26] audit: type=1804 audit(1628259099.939:65): pid=1571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir270668686/syzkaller.U69j6v/904/file0" dev="sda1" ino=13939 res=1 errno=0 14:11:40 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2276, &(0x7f0000000080)) 14:11:40 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:11:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:40 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40c82) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) 14:11:40 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:11:40 executing program 2: r0 = openat$nvram(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) setresuid(0xee01, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x480, 0x0, 0x9403, 0x5, 0x2c0, 0x2c0, 0x3b0, 0x3d8, 0x3d8, 0x3b0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x3, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e0) [ 967.106204][ T1609] Cannot find add_set index 0 as target [ 967.123945][ T1610] loop0: detected capacity change from 0 to 1024 14:11:40 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x14, 0x0, &(0x7f0000000040)=[@acquire_done={0x40106308}], 0x0, 0x0, 0x0}) 14:11:40 executing program 1: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40c82) 14:11:40 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205647, &(0x7f0000000280)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "00c75dce"}, 0x0, 0x0, @planes=0x0}) [ 967.252259][ T1610] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 967.375901][ T1610] EXT4-fs (loop0): get root inode failed [ 967.388687][ T1610] EXT4-fs (loop0): mount failed 14:11:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6b, 0x0, 0x98) 14:11:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:40 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 14:11:40 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x40c82) 14:11:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}], 0x1c) 14:11:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000100), 0x4) 14:11:41 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000580)={0x1, 0x7ab0715dca68fed7, 0x0, {}, {0x0, 0xea60}, {}, 0x2, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "b8ee0816756b62187804752330b2b55830d7228ef1593c0639bd084bba0bfd8db72f70e5b2e7f90e11cbc6ec61a03fc316d5d47970907af5fc4a27f6cf718909"}}, 0x80}}, 0x0) [ 967.713486][ T1640] loop0: detected capacity change from 0 to 1024 14:11:41 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x40c82) [ 967.816114][ T1640] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 967.850742][ T1640] EXT4-fs (loop0): get root inode failed [ 967.871463][ T1640] EXT4-fs (loop0): mount failed 14:11:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000100), 0x4) 14:11:41 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x4) fallocate(r0, 0x0, 0x0, 0x400001) 14:11:41 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 14:11:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:41 executing program 1: syz_open_dev$sg(0x0, 0x0, 0x40c82) 14:11:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000040c0)='net/ip_vs\x00') getresgid(0x0, 0x0, &(0x7f0000000700)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) syz_fuse_handle_req(r0, &(0x7f0000004100)="e5ceb97e832a3c36b0305c51859b3fece7626b926e173ba7b3974e2505d920e464301a73da14cbe95005525527a9a13e6c6acd6a38b9a909c5bc82636baba2cbb8b084eba3acfb317047924460f90f95eb6079d874372e592855e42ca6d00d39eddd2dfd569e51874d75654b510c145561786773caaace124d24c08487a0ad2a25662f81b4df0fd2c778bdae194f6918153934581ee95aa15bdb37529ba2c3578598eac2e6d0fd1c7f3f0e02569cb10c1dbebffe8ef8783c15e61b14bc359bd2a8d53caa7fec17440ea520ca99dbf8c921c483ef57a56018f80a8a3ee10b1d02eb8e7d912108022714f2df5e48059adb4616da96ec503bc0ab07c648bc910946e95309c2ffcbb6f47f0e40304f5698721166c1179b6732bc7b1760f3b86a0987e238776e1c27af3191c60db1918de6605d033474a03cceb8bd9c32b554300058a77dea9a142af8416699245f1617e7d245d2c2ba8c595f553b7a383d38d259c7685fd8af40bb4fa0e368a35bb4fece8fb044f97a938e479d0e96c2d47625928bcbf84b0ffb1114878042b3307d3f0c525333315bf43f6c374aa2a5cecc39391a8077fb2ca1f1b2362e265b3c52eefcb0e9839d88c4783df85b590ce3ac379a71d4d0bf922df15230140e11c72dd5742c96b502f5dd433f8e167174384e6fdb004301ceff882ec1d8e8446ca868c13df4f2e2a28cf8b792d727c6559f53ac313c619ee6b9a31e50aa2e5c061d84fbaae187ec6cc1b79050c74ad5ee93e8003617976f67a8491b4c6674343c78accd30aec1aaec7a9f884be0ab9f3b271b1bf3e64393fc4510f8dbd16742b00a39641bd9dee4723633475beab27b923da933c9cda0fe5046e5c9900f8597ccbed877be402ad4f147c77c620238328ea834d5e333c0cbb8d48e5f7798a360ecea7d1764fef6996283c9a41bda4303a61fdc1f0bc402d71ed408f070dd7edce606c7dcce247bfa506f64d04bda8c1352010d6027ea8e1681f32615ff8b6dc1a45defc18cfbea3b438a3dfc049f55d4939967dbff9993c636b7d5ec160606d3208e87b888f039775aece9e3cf1db41f97074b2b18c38cdda4885df5d4111636c9ab3b04b84ffb219c74b11b5a66904971c25320cd52b7c496ebadcfd45e6c6b9f886ee0ca57db1a5ebf4da9334570ff731e84c9cf1b3c3e3c0d83a1af60d28bfd832db5f639fc1d29e8954cb886d92e8b6c9b42ab052ce8a67201e93bdaf8f3ace19342a5db336216ecad17860c27e58b8428e2ffa078a2420d6e76adf4c945e31f361b364036f54058105d173535d516411a7e700c7ce03477adc2e581736863bc37c3f25097c592ab2e6745ac57b71a1fd921a4378354a9912ab3712e422f6e0700dbf0d82f879014826eb30e2230961b83824c58f4354b3f9b518385e1090510d9732d53ccc4212bf6412360a9aca1ecc7c1d3086834a3fbdd9b19fe43105ce9f548dc01472a6569019bed306a221a75e3d5758c20bab3ca65034c6e74a2119e97c74c6408b9ba732eed5eebcfe1a3eef74ae10d58a91ae7ed0f821c89dda8dbe0c1bdc2fddfcb34c51578d727282a50305ef258d8e2d6cc06e6f7e6e3df4c0f67452333f199a95e0251b085b0e78795e2c9593d4a9a0a5f07fa7efb41645e37515890c04b641de296ba565993046cff3b2a0179d3323a5151ec2f7f78e5df4fa635574ef0ee1667be09ac98fd06a50df00090934fe70b7774be77ca432475f2979861ce0b759b700d8db5a961d1d8a3dce30eb0a3e75b1f74fa07566f0f1a1333e78042f256b814e4b62bc7888828e130e538302aeb98291b671ea23d8fb369c996e54e02b8a407cc2875a51196116a491d326b18c81d8c7e00275bf10f800a3770d160c86345f0c66aa3a143073c79799760df2a3f708f6045f464bff06f2ba77f3a1a84b29604cabd2c373b21e4f307f8854a9fa268292a99278e0df0d46554e8aeed79745688e8604c883055a29f2f3598dbf78884572ed7b01df04f6ff675ac213457a95a58093b3feffab482e2012174cdff8772a083461b29e4918799b43264fd96fd1ad09d097208ae03517b92513b843696601851fae4a58ca9e7384f96dbc4f565d3b98ffbcb9eb0cea89ed59638da714e820ae7bb827fef44f00fbf122345a5e3406b7c8b2f3c2b85503592a3f3fc2326ce66d6ca389f30eb445fa52235cff5bd96c7916114765957af8c8a6ecd69a2ac49cfba3e57b8d5809d12463af561f2a9dda0fb320e4a8b872b038c84c8c59513a3e0424aef85aa481816eda7ea2da44c6b67d084a59d1160dd36ec7a88a34f28ae74a0e4bb7047980ada3ce3facc74050b69c518c992b12766b73bca75cea82d3ebc8c34cfc12a41f43a667c99a194b1fbb3448cc27ffe933e674057b979de729047688b57c9cca28f62a4bfe372accbbc37b6fc1d43520ee2b8f8a78a3ce06dca21b695f056e8fa13b9c0b6842c1de0f56269027f948c133fca02a8d3255e00c5dbb30df60c020f06faf76557843f8e3019c43d1415835c442c39c08cf777df349157ac0aa8210bd5f66beaf2e4eb398e8d6f826335a5d5f8356035b684b700340b85092b579ace4a4624ec3dd8de3e1d575d70e8b889ad2479f555ea99494ec9519a02887e59a69b5feb0dc6bb1c4e2787976e12770dd32a48fb26d715193d7687cfef26e32dc4caa6cdd2c98b5cf42f7b9c168acd06590354f76e4e129592918a6aed73bba231319d270c2b3e32ed1d05262fd612c967bb6ed1c75cc4e004405cf839f181706ebee5e77b723e2c74765b0494c393eab096975b2a09821415f5e7d1de8a2b33267437a0a79504b036f5b282021d21ac8a9942ee59917cb4a2372339191f6fe4fc0ab57623dd2aceb958ce16f3fcf0c185f2081c6b33560cb22fb35fe067f8a70bf6f85e9dbe22f492afd29bcab4b8ac73866748a66e297a4b52e0875427efdf8d0e47cb3bfaacea8bbac30651a8dc26436d20dc5dc6ae2661480413dff0d7fd7abce38c189a8f7d8aba46dcca3fb403a9db2e03df0aeae2eab5fd52d00e42625232cf6b31f5ccd2af0408e8e3667f3bdc5054149a3b6c38a6c3eab9f4ce5f4da36b498eedd041bc72328dbc7837ff43ce35be22f0d1c051d6ce605016b4815be17da815bcf500114c6c11e09ed602e24da5ab606f1ec166dbe8163fc0050a2bf58ad27a55f67e87207ebaff9b703c529adeaf0116753d31eff381e751c44763a0c500be88fa252eb0567caffc991e0322644a0c309dbb9d5f00c05a6ebdc89351e897c7ffdedf22c9e9e5b07c23b90789c3eea0e8da9e8fbeb366678c219db3bf2c471dcdd38c0a6faebbe207e8b4031e5711ef9e6159acaf666ed1fd5dabec2d3e648533e2053d567a0d4227f5733341a6f6a4180f116fb11b12f2e77361bfd8a04718f5c3f52471782580b506b3185b87930422b6adcd07bb8a11143b004e8522754051721aaa55fd205ba2ad580d721d609e7987198f85c3cc8f45f790a5de2d20cbe9acee0f795e65ce638dc154852a79ceedd20e3d88d33b01068203c7acf3727d2afb7bb59557852cca8d0b632f4a8241c9688b1019aae8a87356136d843806bc2d54a82b4ff51ab0bd648daf1e0e96c81a4cdb2a6e0c4fb5a07e098cc2084bc57e6ec93013ba05551d01a8792ae844c1d182f2f417b0bbc33aa757e07bc0649535ed8ad58570356984adcd284d021ba1af49872e4193e8d50277ccb00dd3ce34cdc93012057e7d61ceed1e30de355ad0b88aeeb86c0ad9eda9209c7f293a0494623b04a41f84b7dda6a01fd44640e8ed871f3e4176510079a7a4e54027a252cefecea03887cbc1dbbaf06244bba6ffd20600987bf25a10004b79aad3ca56aa79390904a34acba097cef9fa3a810d3000d6d38ed9c477b036dca6f014875496aac4b9a5bd4290bb1f6786bde01801080cb99633217980117afb29dbafcf78d970110b25fd43a66761df7299e1a2425af78eeda67ef9af4530653ec06f2dc62453bd1b5e279780eced8ca36056316d69bbe440d4a5182afac65b282d9d04fc639ab7500a1373d2b0563476faf1bf2bc27a0b731e7ac80658872dcc106eed4dc0a39bd4773784be42e46f207aef1557e0fed188668f13c6d8ec1f96816f1975fd5aae98acb8a251ba56116327264318dbed6e01cbc25785ec43fe4453df018d5eb5c01329adef323407615ba804983992f130577b509ff69cbe3965dd8f82202b33b40c3deff6ff9d38f5bfadec7ac0fac3894b78b6bf5cbd880a2fb9d3dac82526c3cbf7ff51e9f7653c90bf4b9b1a59b8607187ac79cca2cf5a67d443038d415a7ed441891f99dbb32754364ecd301753f72a9baac10f36ac587018780ec30e43a37cfd1fdc5f7ea8bd27924599a6951126cb59e6fad281f36f906b0d4aa3eb93b65ff56afc9e56c553678b5ce8863d2c02436023bd5c7a23ad47e47e29c6e7efcfb49e6e6fe3b715ecbb7c2e7c8415dbf077ffe644d374e36379ac3df7601d5e6c9bb87a4a181cf5eec710ab585d37cfdca18dc4695d14f5fd6944a3e6a7ae10dbf9d650338dee70f0cc6ca0e11c2e0dff48426b41d707367e2e0cb5d8666d5fbb606a81ce1d586aac5896bbc5ddf0e4bda3c4a9facfed4758923ed6277e555dfe8def973a763a64282904ff14c3b6ac45020c6d5051629e0a21d1e6eeeee8588701aa0f773aa85cc0bcac90e90260485a174f33e4309a272cd12701a477aa505cfbcee57662a605a553aa9a853fc3e4163155c2968d955b4eae3b1a9a305159cbcb899b77b6f2e8792d70830e53afa529ea806fea0d1852ee2f165bd5c2f74e372841a4ca24bd5a96472886c184bd75dd7533971eb5131c54ac2aa9f5a1d8d3f64e9e966631c10087c3d0deab611b019e4040d1a445df771d1b6514a8bbf8ef1fe6b4019719b4496cf85a03cea822ba84f9749f568b151c3d003b5aeea2c0cae27680c72983bc7756f91e210db8643fe821f07d47a60977012ec7af31c2379f7d6a5c66fab525feaa80b881ef026cc45ec950471c26b939a97c09058d727977c06fb0fc9f8458c4fab2266a1f81e019b003514a0514f9e1c19d4c2eb11535155597074633816890e6d9bda1c29f3a339bd4b18d4234eab1345f278563ab6587b00e30a7ab8df3d1ec0dfad734f3e9b2cb5278026819854c504e7074114fad2e796b749f08c6c03fa6257de48bec15ef79d2d203b300d116cbafc0374ad0c760f1da9510f79c5ed144e7f2c4508ab2fe9f4f359969e7243190f2d11a8297f4d26194aa3d70fb0a32dea9784e9be5e7fa32800a725d123d6190517784c9b598f16e2268e3820ea001d7b92fb7de047db042e15dc49b9d671ff0033616822a17d1daa19b3a96639cf73e11da200d699113400b2fc5c40fab2367ef239f299d1347bd351983d50b97a905151cea22bc7f78bf02daf1d3a7bbd7f30768ffd08de19b791a8420675d7fa63a5759110ca2f9f3b81a41021520c8c12225b0e52017fc39c18b6bec047c9812db395e3b481a58ab89bd7c81f80e2cfdf3bdf4e9c51d4b70b37561f03d11764609fcdf597671980746c99e58d0a3eeec11ce26215b353d71ea48b849655a057669754945770db5de92479c2b9d8cf8ad807f018cf4a2e47dc928ebac4f5bd09d5e0176e06e323c1ebde203954a884df962f5054d1092341f237424d5971b6dd3a8b9d83909872b7567a1ba8699952af5ae01632459b6d774ffe078c3f55c9deee3c1e2e2779e2cb6111b733f8075dab913a32682db0558b0faf50cc6de7859181bc2f3f1474c57974132d4700eea27d5aa406f0b8ce28761ef3fc904748f1f12d0112975b835cccabc6997cbc671d580d401078bd44341775e14803cb73b1f7341dba79fe78ddb5b0211d28812bdb5418fe43eecadc291181b39b91b0651d327b01927146aa636fc7305bf670437f338e3562b906eac87ed9f4d0fd2da3833d4c6cf6fe9c19669d8459cd6fa7d4f0c3ad590fbadf1dd9565ecc3ee48b9905de4ba7a56367fdd54afd0412b54c6d5a820ecce7587301b60b58932810c5c0bc8f41edfd9903a2581aef2f577d8d56831388368f12209d0e71d50fcb2b122f7676edca0c6b3af0bb476c4357ae1ab1a8e2ee0b4dc64796b718d4abc59e33b8aa8b9638cf1c168c3008a30056769d81cdae9699347bda7df3ec6baa915567eafecfe8ed9f84e0f0a93c9434c0464a1dbaf10160728aca0cf06a76b58a42d2f63691392af2215f4655782828dda454c635f8762647ad13dfad499901c94a794aa67bb57acce61a92d3a511af52a8dc3c128c62f1819f8a24c41af16f72527c484de2d8f3d68373268a03f07e04f25f3a2f956fa77b48f00bdd02b64b189da771662e77334cc44c749891f236844e657e68e51a2af631c53cb4e0824313169653c1bb21ccb28ecf9c823a67f288b51af4af8d9c2450135c677976cf7ab3fdd32dbde9baeccae6830beaf7a64ed284f3d1ba4e7eede2cba5593897e9fb0e1ca3c7bb8ec3057954a96b5892f6f4d52a36c88830aaf68da02549de223ff55daff8545f083a241cc5044d255a5687430afeca9a49a00f2fe5104e67f93aabb0ffac13fca92d1f8e99f4acc8518c3de9825a20a1d7db7b931fd1b4c1651788f54b9bea57c7b4a5556c21d959116cb648da391bb7f12fcc7b75b43308e2a91e4fa9f1de2d3f9d8588ed12d6f16fe19aec3ec989905b32f97c83c7a74e0fe54881c076112163b31a1179b1ddb19d33c363a9c982c58f2cbb22179065862a458dc844b382a0e3e6bcac4cec389c7c20de49936a05874ff08485b969880b5c3f48efa658ae31fbea8322ec2cc3050dd09cda5bc2d3f15b42ca97aa045c5249c3d5236e1e09bff5f614514ac98aa4359bfca04a79fe59ca4bba5dfc566f76b1361f15aafae347da2ea88f91428d64cd519762db067b67e73eb9464d5212cefa6a11a2653a65318813bc6a6ae5db95d43c8249dbb144f6eab47ad5d620bbc5acfd41cc2d3af4bc38009a97a99c01cd74757e0f92dd5988ee50e9112fea25b5b4bc0e1bb0c527eba0eebf415c666d7f9d27695489b7bccf3e90000042ea034178257bedbf24f02ad976251adbca1d1f7638b2ecd696ac09a789fac725495f275a9f0d1dece4600e7af9e9a14caa641aa7c9a836a480c61f13d5784c2661b0439deb9330b5eba7f85043c707f8eff38c0bda443b4ed08843919365dc22f809c5bb48e92a81cd3902689e9f8ee41e9cee4470582398dc86eeca20ec5626778e7b2688bf13469e4bb97b86fe392d88d899eea3bec4309f9a60e40e8ebbec08bbf4343805954608b46522c409afc9494d0a65493c969646e4a3a07606881fc42e637fcf3a9efd936cc3c9e02dcf8f31895ebc91d27c02e5c335572e9e3accf36a340d69c31df7e73c51b3127dae256d1f700c3c0f090a7b5f718ba01ea461aade56aa48d86900adb455fc4e2eaa04ffa264cda60efe37efc6c7f6550934ec808b8236ff2dfe78b0ee73be4cef66e8fe92708400e7d74708ac612e37755f558fa356b3b619422872be05aca95e655f0d53203538c7d20a4f7bf32b49b04acfa03df371545c14b15001ebf6bbb4df8df0b997097ebc92f41492b82f13c0a72f49a4b733d2489cd72b8d6ad576cd39425f140a9c04c2428d4c258ba9f00cb7a2a59434c92793652cded1965b77217ae8bf0dc9c4c102615819fa1fb7ed5ba3a425ab86de3a6c9ab49006ea99c4c74141aa68540f7c6f7518fbfd270f844e1a15eeb84a84cbb77d66f63dad63ffbe3f8d4a582785a4dc9e14635f13807c58cb00383c19da2dde74336face785380a798a4d30a2833c92b41a55949f0a6723f4cab0b54f621f723c393c9c0ed890ecb2d0ee5e0ff7b4feb0cbd249dcc4a76e1f510eb4573c922c989c6ee44d4fed88d1c5b2ff407e1d1a9309d541eca5bcb9a14f624ecb45a12686f70a6a557940549c14eccfa42c243132ab6d59b975f172da18ed180426069ca97754131db208b50d4183544c80dc08ed2dad3aa1305db2e39af2a2b1e63f45882e353475cf710805979631a00f0d62d245a5226339b1434462e284b902bdfb942e811c52be477c3fb24103e007265e05773b8ec10b861aedc8d0159edcbe8fa61354a568be0dbd6ba2fe7896fe439fe81d016711abe2bbaa38394e8c6f8b3a12a6d8d871d78a1c22044d42915316b474bb28135d5d8bb02a3da8b0a061cddb804787296e8f3836a336540f61e1348b8511fc71f33d76dbb9a64b125b69cac2e6a7f823fcef4245838c708eb0834bab2703fbd07fed5e81fa7c9419a98956861b40be2b3e2ac456bea0f1c70c7154af6e66cdc260ba8275412ca07f06934a22b9f389d1180665686bd8bb6dac151dddd3a223c5314527581a8cf4ea18029a1e216fdba2e74a9eb311e0fe12d7faae014fd7aa286fcf8fbbd7a5d599a2f46b1214324791192eee90c1351c898e37cf50ffa8c1493b768eee9b89670837c24fc33520f4966447d8bf5d3cecdaa193af011cf238e05f68cab56001472341be81a8bcc6fe97b288cd6da45945f3035d71ec922c90e8806f333dc047afd410dbcfa16914b202bd1224dd01c4a5fcb01cd142e47c34be28e2cd424c81ee9e943d98b1f27b4f99d5f2eba658f3fe72a7f04668e759f71bb469480d45cbb88a68de61bfee86b0e365a7f7d81c37ad369cd62c0a9070d55d35955eb9217f5641291bf380d89b02ccab019735562f7aa066bb820afe8c3d56a5bf6484b96a8d029a3e31a67a429661152eddf92ddd8c3568351d3d2806a1c84894043002743fb958891125084a420fa1a0241bc0b46579b5d7359dcd719c01170a91c8b9be5d20bf84d468d843bbdefb342b9c302eeda39913cb3ce0d25b95d6b20acc5a5fdfaec0d0e9272f4236beafc060c05d0642e7325f1163ee61e951c173dc11c086de0f05c159061b2348f3a6c7eb72e0015b9fdb3739d518a4a3831e333d12a5d1da44d97eac87664921ad7c36a028f54b0a758cd7cd80def3d26135c8be95de82328ad2232a590fc02268e34e856a11930e59ed7f92e66b06aa0e30f1681215c4f85d986aa1ac52279a33dc6ddbf1ff758ec8326da77892d50cf5fa11dd40eb9141c61a317e78a2f6b02a45e804f80129e94d95e5d958aa6623064e63b0d865b1e735cebebb387de621dfe31cfac2d1044b3c3abd287f9bc61ca2ba2425654871236c0d0009ef814742a4078c72fda1651bf935cd62a81afc18fd24129c36292508f5a63331fc9ccc8542d065752cad4872b7996ee2290ed97a967e3f8c4876229ff5db9d7125a636030280b004ad46ed106c46d51248aedc6c746a25b6870c471993522afa6ef61d4b07cae6f29a4f82bc8bd8788fb9899f29710636ec003a3c7e4c341e708a57cd9b94fa032652ff248545e8441fbc85a0b8a2d8167c45b1c1672f25ad210bfb2d19572065ce79e6bbc1b87a79ad962896d5c326a9a01873de1412f5db2f99e3e26ed2f8e5b82644ea03e9b6509a65c2aa0274938df55ac3b9b4422c0795c7ef6b4988be464bcd1012e8840beac94ba95333677541d61c32375574482e3df11a9e82c7a451697b94b3119a179f1af87bbe9df8637c012c682e77b6377763dceaa15d2e2bf21bba03a56a613ac37059f33e84ddd6e4a587a0ed01db30aa93ea7340d91c46a25b5d0ceb9c55cd012b3ea732371a1d2278be5ba41dcfe11b3dfa9c6aab57b885b1f6a5e9faa2a72d67eb4151a311b9d5a35cea2f217d6cb1afaf0bb05dd941770739167d13a0ab45825eec312f5d18c614f6d9dd239b07314a3adfce945f7ab3996c570d6142565f7239a09ea0378a5d78645bb0f09b2726f113ef4a4451f9c6c2a5637e53a0eab35c0e8dc643a4aba77b96b87764d61ce0a9aa25f512f5b318f816edd20391c1beee00de89798a7a26585182087080eebd972b7333971fc54133c591b0ff87e1ef96d0d617948cd971a2451cd6792bdb9607cdff3be8e3e078740256517c1d9c10d01e431db7ab91dcca817bfadb392fe5fbfe30251e77eac1a7868bec194c88692a3fa09fe383406c0793ce3047a965d6f0bc75f9d64ea680201a23679d538d43b358e6a567df7a54cbdb2bbeefa0d5d91a04a7d69483873ef250a55ce6caec4eeaae887656dc08ddcf8d6bb672ef3e1c7b2894ef43b01d1d636be3ea397a702989f9074c32fe75213a95b360a0c37d50ce7856eba67b2e8ce7c7f7084cd913a6e07aa308cb4a98d5d6fcd1d1ca87cf5b3da3dc196b4db7c1fa7acb4dbd4d2a2cad2f4ade97eb1c3f6ea9d854f1394ee2bae92de7e099f048903f1d53b0fb0a9c53bfc258f6bdb97569b7a3a5c3e56311898ac334fa9d7291a7e73f10c03f7c760bda6801a07c61d5c337cc0aa3982521d8bf799c9665e1dda9da94647ee723f931a541738c83b9c0edd9bde160616ac66a44de336797d4b9e79c46dfda6f3870df7c6b13e249baa7bc8848ab1dc4caf120adfa43c383c1861edf8086201a6446331d332cb47b682cb6933db738177580296dff5192ad7e642acc68f80c4ff0694b226adc0950d285dbbf0ff1ba2a85ae242663b293fb843727e08fbe0347e0d54c0fc9fa0d6040d1e9d1f72885a99ac355ec3b00d20cc1a01eed79e58265dd51ba29e50b767403ccb8d447fed8c48e74678cfdef3e02aea59bb5b749975788c12c6b87ce2f7ae768bcebf01deee821fba032fa06aaf0848c1acd360756bea8bf10075116e9a634fe38506e93f6dd20261031cf7af7639569fcb109dfac65570322a748f327108c4a2f3be314f55da4bb14a4d8e88351c4ed867f9aad7942510197306c62b03119770ef472c00ba605303ecea85407c2b22eba02e9c4c8a9d5ab0f63cba1ef65509c078aca6bcf40005034634241a4af4d0fa3428f56f3b0809fbfc9fdd2e4e31985f7f8fcb0a17216e115c11c411aafe0f2a00f269d55376e48f70acbcb921e405002439f6f5ee9210ad9e3e66e7d849f43328f3edde361f88571ee6291dceada812d7aa3ecd4b082588a4f0938bb83917728acce716948fe187d7ec930ddb333e93b5f16580d14b8474973572e494df7df20a3f44cf7029f0276534bb55133c65b78fcaef08f1609e662ec20bc5491683f68f39e2be12109cd556b1057660392f413d505fb08eb4811ec509f298d17692c894c8f941ffff9f87ad6fddfa64cc72ea53a256e92dc53da8c5a7566f032d2c16e3e15330f781c111aa6c058c069a88566861d8d6ceddbae5a88f05217d1330a76abff4942e34931f585d6cec55e603ae96133efb86e76ead48e0d657ab99cf1124ed8c72fd9e2e65d80e4fe8ac5579d8ae8ba446220289ef6f14e9f5f53946f2f92c9cf89b33f54181d109ae9d5b155d6703666f558f211e3613ff53f5b4f055d8672b02cc529cd7ae51b02898e197d3638ae789beef7123ed1316d2c61ea5bc9bb0d29afedf9f457136d548e8a1fd1a117cc79f681c5e4fea1542dc212d3e548e2d221666c67c40057f7a720586e2113a0e276f07f95614a434a4e6a04a93eb9cb1ead5291bc747d742ebe9474701608895a6e8c31eb9a3b64dd98c02ad8e1fbdb317c1d3b9b63d1dd616", 0x2000, &(0x7f0000000b00)={&(0x7f0000000000)={0x50, 0x0, 0x4, {0x7, 0x21, 0x3, 0x400000, 0x3f, 0x0, 0x19}}, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x358e, {0x6}}, &(0x7f00000000c0)={0x18}, &(0x7f0000000100)={0x18, 0x209263b33c2c90f3, 0x1, {0x9}}, 0x0, 0x0, &(0x7f0000000240)={0x60, 0x0, 0x8, {{0x0, 0x0, 0x5, 0x0, 0xdeff, 0x2, 0x9}}}, 0x0, &(0x7f00000002c0)={0x1a, 0x0, 0x0, {'net/ip_vs\x00'}}, 0x0, &(0x7f0000000340)={0x78, 0x0, 0x0, {0x0, 0xfffffc00, 0x0, {0x0, 0x101, 0x1e0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0xa000, 0x8001, 0x0, 0x0, 0x1}}}, &(0x7f00000003c0)={0x90, 0x0, 0x7, {0x0, 0x1, 0xfffffffffffff800, 0x80, 0x6, 0x800, {0x0, 0x8, 0xffff, 0x0, 0x7, 0x0, 0x13, 0x3, 0x0, 0x1000, 0x4, 0x0, 0xee00, 0xd7f9, 0x9b55}}}, &(0x7f0000000480)={0x30, 0x0, 0x2, [{0x0, 0x6, 0x1, 0x0, '\xff'}]}, &(0x7f0000000740)={0x298, 0x0, 0x0, [{{0x3, 0x2, 0x0, 0xffffffffffff8001, 0x88, 0x20, {0x0, 0x160, 0x6, 0x5, 0x80, 0x0, 0x8, 0xd7, 0x0, 0x6000, 0x7, 0x0, 0x0, 0x1}}, {0x2, 0x0, 0x0, 0x2}}, {{0x0, 0x0, 0x0, 0x6, 0x0, 0x0, {0x6, 0x0, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0x4, 0x1000, 0x9, 0x0, 0xee00, 0x4}}, {0x0, 0x9dea, 0x1, 0x0, '\\'}}, {{0x0, 0x3, 0x40, 0x4, 0x0, 0x2, {0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x550, 0x0, 0x0, 0x0, 0x4}}, {0x2, 0x0, 0x9, 0xffffffff, '/dev/kvm\x00'}}, {{0x2, 0x3, 0x0, 0x3, 0x5, 0x2, {0x0, 0x6, 0x8, 0x0, 0x4, 0x9, 0x2, 0xfffffffa, 0x6, 0x0, 0x7c3}}, {0x1, 0x0, 0xa, 0x2, 'net/ip_vs\x00'}}]}, 0x0, &(0x7f0000000ac0)={0x20, 0x0, 0x2, {0x0, 0x4, 0x597}}}) [ 968.186537][ T1669] loop0: detected capacity change from 0 to 1024 14:11:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 14:11:41 executing program 1: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) [ 968.304352][ T1669] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 968.387165][ T1669] EXT4-fs (loop0): get root inode failed [ 968.392957][ T1669] EXT4-fs (loop0): mount failed [ 968.422004][ T1681] general protection fault, probably for non-canonical address 0xdffffc0000000023: 0000 [#1] PREEMPT SMP KASAN [ 968.433761][ T1681] KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] [ 968.442175][ T1681] CPU: 0 PID: 1681 Comm: syz-executor.2 Not tainted 5.14.0-rc3-next-20210730-syzkaller #0 [ 968.452071][ T1681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.462166][ T1681] RIP: 0010:destroy_workqueue+0x2e/0x800 [ 968.467882][ T1681] Code: 49 89 fe 41 55 41 54 55 53 48 83 ec 08 e8 fa 5b 29 00 49 8d be 18 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 2e 07 00 00 49 8b 9e 18 01 00 00 48 85 db 74 19 [ 968.487500][ T1681] RSP: 0018:ffffc9000ca47b98 EFLAGS: 00010202 [ 968.493688][ T1681] RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 968.501753][ T1681] RDX: 0000000000000023 RSI: ffffffff814c5c36 RDI: 0000000000000118 [ 968.509730][ T1681] RBP: ffff888075285340 R08: 0000000000000000 R09: ffff8880b9c3294b [ 968.517706][ T1681] R10: ffffed1017386529 R11: 0000000000000000 R12: ffff888075284000 [ 968.525684][ T1681] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 968.533657][ T1681] FS: 000000000290e400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 968.542595][ T1681] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 968.549186][ T1681] CR2: 0000001b2eb22000 CR3: 00000000b26e3000 CR4: 00000000001526f0 [ 968.557170][ T1681] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 968.565148][ T1681] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 968.573120][ T1681] Call Trace: [ 968.576405][ T1681] hci_release_dev+0x125/0xb70 [ 968.581257][ T1681] ? hci_bdaddr_list_clear+0x200/0x200 [ 968.586730][ T1681] ? kfree+0x395/0x530 [ 968.590861][ T1681] ? hci_uart_tty_close+0x17c/0x2a0 [ 968.596158][ T1681] bt_host_release+0x15/0x20 [ 968.600817][ T1681] ? __match_tty+0x90/0x90 [ 968.605242][ T1681] device_release+0x9f/0x240 [ 968.609937][ T1681] kobject_put+0x1c8/0x540 [ 968.614419][ T1681] put_device+0x1b/0x30 [ 968.618589][ T1681] hci_uart_tty_close+0x1e4/0x2a0 [ 968.623625][ T1681] ? hci_uart_close+0x70/0x70 [ 968.629531][ T1681] tty_ldisc_close+0x110/0x190 [ 968.634373][ T1681] tty_ldisc_kill+0x94/0x150 [ 968.639149][ T1681] tty_ldisc_release+0xe3/0x2a0 [ 968.644012][ T1681] tty_release_struct+0x20/0xe0 [ 968.648877][ T1681] tty_release+0xc70/0x1200 [ 968.653402][ T1681] __fput+0x288/0x920 [ 968.657467][ T1681] ? tty_release_struct+0xe0/0xe0 [ 968.662505][ T1681] task_work_run+0xdd/0x1a0 [ 968.667019][ T1681] exit_to_user_mode_prepare+0x27e/0x290 [ 968.673314][ T1681] syscall_exit_to_user_mode+0x19/0x60 [ 968.678789][ T1681] do_syscall_64+0x42/0xb0 14:11:42 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x4) fallocate(r0, 0x0, 0x0, 0x400001) 14:11:42 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 14:11:42 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T', 0x4) fallocate(r0, 0x0, 0x0, 0x400001) [ 968.683220][ T1681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 968.689183][ T1681] RIP: 0033:0x4193fb [ 968.693082][ T1681] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 968.712696][ T1681] RSP: 002b:00007ffd6e2100b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 968.721119][ T1681] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004193fb [ 968.729095][ T1681] RDX: 00000000005701c0 RSI: ffffffff892db7d8 RDI: 0000000000000003 14:11:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0x81785501, &(0x7f0000000300)) 14:11:42 executing program 1: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) [ 968.737073][ T1681] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2eb22520 [ 968.745050][ T1681] R10: 0000000000000b09 R11: 0000000000000293 R12: 00000000000ec747 [ 968.753457][ T1681] R13: 00000000000003e8 R14: 000000000056bf80 R15: 00000000000ec71c [ 968.761546][ T1681] ? syscall_exit_to_user_mode+0x48/0x60 [ 968.767200][ T1681] Modules linked in: 14:11:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000040)={[{@quota}]}) 14:11:42 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)='Z', 0xffffff1f}], 0x1}, 0x0) 14:11:42 executing program 1: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 14:11:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000040c0)='net/ip_vs\x00') read$FUSE(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x448c0) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) syz_fuse_handle_req(r0, &(0x7f0000004100)="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", 0x2000, &(0x7f0000000b00)={&(0x7f0000000000)={0x50, 0x0, 0x4, {0x7, 0x21, 0x3, 0x400000, 0x3f, 0x40, 0x19, 0x7fff}}, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x358e, {0x6}}, &(0x7f00000000c0)={0x18, 0x0, 0xd4f, {0xae9}}, 0x0, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x7, {0x8d53}}, &(0x7f0000000180)={0x28, 0x0, 0x7f, {{0x9, 0x0, 0x2}}}, &(0x7f0000000240)={0x60, 0x0, 0x8, {{0x8, 0x3, 0x5, 0x512b, 0xdeff, 0x0, 0x9}}}, &(0x7f00000001c0)={0x18, 0x0, 0x4, {0x596}}, &(0x7f00000002c0)={0x1a, 0x0, 0x85, {'net/ip_vs\x00'}}, &(0x7f0000000300)={0x20, 0x0, 0x100, {0x0, 0x1}}, &(0x7f0000000340)={0x78, 0x0, 0x8001, {0x8, 0xfffffc00, 0x0, {0x2, 0x101, 0x1e0, 0x80000001, 0x0, 0x7, 0x5, 0xf2e, 0x2, 0xa000, 0x8001, 0x0, 0x0, 0x1, 0xffffffff}}}, &(0x7f00000003c0)={0x90, 0x0, 0x7, {0x2, 0x1, 0xfffffffffffff800, 0x80, 0x6, 0x800, {0x4, 0x0, 0xffff, 0xd7d, 0x7, 0x5, 0x13, 0x3, 0xfffffffc, 0x1000, 0x4, 0x0, 0xee00, 0xd7f9, 0x9b55}}}, &(0x7f0000000480)={0x68, 0x0, 0x2, [{0x0, 0x1000, 0x1, 0x6, '%'}, {0x2, 0x1, 0x0, 0x10000}, {0x0, 0x6, 0x1, 0xa60, '\xff'}]}, &(0x7f0000000740)={0x298, 0xffffffffffffffda, 0xb7, [{{0x3, 0x0, 0x0, 0x0, 0x0, 0x20, {0x3, 0x160, 0x6, 0x5, 0x0, 0x0, 0x8, 0xd7, 0x8, 0x6000, 0x7, 0x0, 0x0, 0x1, 0x8}}, {0x2, 0x3, 0x0, 0x2}}, {{0x0, 0x3, 0x6, 0x6, 0x0, 0x470, {0x6, 0x0, 0xea, 0x100, 0x7, 0x0, 0x0, 0x1000, 0x4, 0x1000, 0x9, 0x0, 0xee00, 0x4, 0xafe}}, {0x5, 0x9dea, 0x1, 0x5, '\\'}}, {{0x6, 0x0, 0x40, 0x4, 0x7fffffff, 0x2, {0x0, 0x80000001, 0x0, 0x0, 0xffffffffffffff6b, 0x8, 0x8, 0x0, 0x0, 0x4000, 0x550, 0x0, 0x0, 0x5, 0x4}}, {0x2, 0x4, 0x9, 0xffffffff, '/dev/kvm\x00'}}, {{0x2, 0x3, 0x200, 0x3, 0x5, 0x2, {0x5, 0x6, 0x8, 0x0, 0x4, 0x9, 0x2, 0xfffffffa, 0x6, 0x2000, 0x7c3, 0x0, r1, 0x0, 0x8}}, {0x1, 0x8001, 0xa, 0x2, 'net/ip_vs\x00'}}]}, &(0x7f0000000a00)={0xa0, 0x0, 0x6, {{0x0, 0x1, 0x9cf, 0x9, 0xffffff4c, 0xffff6e5f, {0x0, 0x7, 0xfffffffffffffffc, 0x9, 0xfffffffffffffffe, 0xa64, 0x10001, 0x138, 0x8, 0xc000, 0x7a04, 0x0, 0x0, 0x9, 0x5}}, {0x0, 0x2}}}, 0x0}) 14:11:42 executing program 4: unshare(0x0) unshare(0x0) unshare(0x26060400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x87400000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) [ 968.955516][ T1712] loop0: detected capacity change from 0 to 1024 [ 968.971091][ T1681] ---[ end trace 38421d8732750ee8 ]--- [ 968.977859][ T1681] RIP: 0010:destroy_workqueue+0x2e/0x800 [ 968.985172][ T1681] Code: 49 89 fe 41 55 41 54 55 53 48 83 ec 08 e8 fa 5b 29 00 49 8d be 18 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 2e 07 00 00 49 8b 9e 18 01 00 00 48 85 db 74 19 [ 969.016702][ T1712] EXT4-fs error (device loop0): ext4_fill_super:4953: inode #2: comm syz-executor.0: iget: root inode unallocated [ 969.093349][ T1712] EXT4-fs (loop0): get root inode failed [ 969.139200][ T1712] EXT4-fs (loop0): mount failed [ 969.181077][ T1681] RSP: 0018:ffffc9000ca47b98 EFLAGS: 00010202 [ 969.202740][ T1681] RAX: dffffc0000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 969.226016][ T1681] RDX: 0000000000000023 RSI: ffffffff814c5c36 RDI: 0000000000000118 [ 969.243876][ T1681] RBP: ffff888075285340 R08: 0000000000000000 R09: ffff8880b9c3294b [ 969.253430][ T1681] R10: ffffed1017386529 R11: 0000000000000000 R12: ffff888075284000 [ 969.264572][ T1681] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 969.272648][ T1681] FS: 000000000290e400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 969.290734][ T1681] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 969.300034][ T1681] CR2: 0000000000543038 CR3: 00000000b26e3000 CR4: 00000000001526f0 [ 969.308452][ T1681] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 969.316676][ T1681] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 969.325063][ T1681] Kernel panic - not syncing: Fatal exception [ 969.332419][ T1681] Kernel Offset: disabled [ 969.336890][ T1681] Rebooting in 86400 seconds..