86c6605905d2de3fff674e7ec5730e4feaceb444bbf1b823c1b672104227c3354d3835a7adc4c5277afabb73d37004b36ca4d587f74814fe4ebbecc585408558a9a450354b281cf696a1cd4b2385b82b03b742dd5949b515d3f742478b08b8494d3a595ea086499339d75c3dd106d6150655bda7d598f3e4e81392967eac8842395676ff59780a8a221147cbf7a48cde0c6f74d91df6d4ba8f32936f2a60f85a188830ccb41247154ea79d99edc8d947172d9be6f7ba129df373916badaf8d7308a836108732a35ab6c549e7a21a7f94f1d339142bf15c6bfa560055559fbac2c93d6bb471ba1a5d7a6b778c3ca2185a2f9f5551ccf3841385c5c24fc3d614b8e1b8aa52342c08e815631a2487beba58d4c5e5efd6f06d040a4b59835913af3c9a0498c05c2ce9ede741e657e7ac25c1d57da49983ec32dc8d4bb29c9b2d16c777e7e9b2c1046785e645fb2be1eaee2d643e7e897d3fe242c143f2684e53351c435b5129bde24bed2a817c89a72c157f06387d0719f7b63906d7e05699d607c11a58a8b8dd903b9af85f1c30518d2c78b0eada306a14ba3efdcf09c1f225d02b735ce0cda7b6797553395d73c42dca866f237bc9ebb1e133d3f872814f68c15cc4e7256b13fdb0bf0e63212414bc61b5b651ac3a7a840e03eeebccb65c7eb7a52f0cbced165ee6bb51a7f6cf28ddd8b2d537f6d91bad359b64c1efc32c3363344e0cd5ce2b24ea2e610f0dbcc9a6ec33c47018758b0ac0cfa6af988c1c19c35db4fdb6624e35c38c2670190ffe41847c5e8b302d76360e044b6ad6dbe5058790f0f2c23c3eb330b1bd3f46da87b0ca619a930c4ee76ebfcf9af2fbab0f349b64f3d487746c4b6fd1ba0fc2b7db4c931fdaf7900d1b66060d939c91bea16a6162b74be01acbef1f3123c24bb3c69e996465ffe09ff0e29e7a56e524a170d6d5d61d01102568770b50e0bb0a2d47aa40d3e2c62a3a075cdc4d7c9580d88c7c6707b0c8722c4035551b0b30365388258dd7a2728efb0417e2a8c29109afd0ad0e9b0c3d50f5a2751e201526a7c45ad95cb40493d5dae3eb1975edf50721301137e14b0604aafb62b28433026bcd8bf57a7a61d9e3dd783db2dd92027abb5c5729e4dc0a909fb82e558784e0974aa68baeb520fe01d263aaa1cdd236d56eafa9044da9ca3fb1d79093787fb2f7137dfd5fa73046448f3fc2c6c6778f7f1ab0ac79ac2a44f5306af056c522a5277369b98d703ad9c45e64c94f6a2d03831bdb7a893d2473c7fc39f553fd5f89f4796ac73c36d05be564070ecbac8cd65ee6d0ed66014c4fa2b1a4586874c05211168c6f044a048b8a8d555ac9dca4d31348808cb6943f33efe82c534a06cee91f2804a1eb7d402ddf9c24066e6bf2eb86c0299fe698204b2b6c8b3fb2eaf7dec15b2cfd15bf75d67dbb0a6cb40bef1ee8a9fa2af4c010f5617d915d506caf4b68cb4efaa7a714b6cfe06cdc96967cb583bb365d423f51874507db38ecb140c3368f67ce0cd04678350b23b63234635196e3b95e20cdb1edeb18314a55f365d9060e4c886be985a0a35b5f1d3bf84a6f761346e121ada416146fb419f127d5754c38c1acd04e2c32ba703b3bbffd64cb31338d2d17426de14c1294285575ea3613716d6ff6e7b854913e3238099f683665d98ee2682d299298242747b088dbc3b0e6a79b4ef0a4488e9a1054180377bc0d204b17d3f82e9bffe6c8b52c73dc679afe95239c918bcf30fb5e3250ed9360a7c0927604a2b93048ab7b4347922e4e9f4d6eb2f45c8800eb1c5f29ba19c02c70423202c322c095fbd62215cd94b6f94c30544b0ed7863b3f78da7daacd022023f547b602586f86d31025b1f791c6a3091bd0b424e4b1e072492fbdd1af525a63072c6669091da77de77031d6475b1b15f1cd1612356197c8cf034ab033e87cfa361f8479a6ef8a4b9ebe11916f0ab63d0208c15b937797e39c9d66f7833a4030a88feb81bc48bcd262ae90b344edfc05e7bf2be248306fc3afbd35f637acbfa4b32a71ad90a1f80678dec5b089526f49d3c6ee9998737e21c7e6ee1e28184aee7183214769459988f98a67294aa89f2f76e9d8880ed1f2fa54b0181f59876f8376692e50b11543cb6af0a23fb07797da1297deace4feaea44faa46efc4687d25703ac4c4309c3ac28f74c79e7a7be1330ca1364cd7be5b134120ebf26277da41ccbd1adf3e1b66236bcc247479b621582897332352863f130726941dfa8d4d7332abc75c553fed5d0d88e2a8c97e23a58ff43215eeef8b528854244dc56643b5002cc1d6233ac3156a2c53b76f8f51483930c72b8e6dbf7aa87b54a81e248e61635f5b00bd2abcafbec57a28385660df98668ccbd8248db80628d0c5169684efcf35eff994361b87f4fa13396c00b2bdf13b965b2341454355861ace0af8d87290c4f88c4dbe87edd5e1d815e3ad5483a01e536f63ac0009b4254a648e05e9c2aca3f12ae5e01e058e8d058df98f9ae0e0d650061905a681fda30a4197e6dd616904fffbd67796c2cb975acfbb982963cd0b79c568892ac4d2d38ccb163679018e24753e7b63ae41ec065d6fceda02c8d6e049ac5b0d4c61719e2d0217da5de1eaaeabd5ec82ceea9e4a7e264c392c9ad1f59013e4661b09ac3742fc78f5fe65e782c764d674eb5174ae11c904bea274095b3b996c6e6a3befd7c720c98fa3468fef431f9b0540dfa06a72e66ec13d9a4227843fb29dacf5cf7c97297a82b967fbfecf95d97fa2653847ff182021bc86acd558156b3c0eea8b4fba5721d8fae8dd75b54d3abd8cd3f1672789c8b125da8b52109bf3e592247b3cd96b4033ddfd039ba01fb8208e72a854d89f528a1bd171d886495b55a3cdc2c4834d3aa9345e0b6283f0a8011c2f60b3638393f730b128479e987f54a96eb9a9a572d80686aae6ee52e30af202245f49fcc773a555ffeb56ac74006e6e02f20415a6e73e6d8931f530fab1aec8b76223cddd79afb46079c95b80d48b271e84d52a329ec95e9cc596b9d0b01f289a7e63d5cd785a28fb171ddf9f1321983c8260908430def06f21142a69a4d281c5f8045c30e6ead7cbedc312a5a5da2847f634886d73ac3460460973d97f9ffaaa8eb21560a79e38496c3e14ae8564d22ab96c85c47e63d6cca36ebb7b402e416906eef719d67321342994a133aaea28355f461f35ae47128939d652ddb6a08550e9f56511b1a10366639057883445e8849b7919ff25d779db0761d22a7f76dda8c7d5fdef4ded673589a1bdb731ed4461a57b716e7c6c79c17620c3ec4707327f4091cf89103c8a26b94a5dc69f0afbc649a9be8add5d780293ec7192642e73ec9007821f36721f4e6f920b4a006820b66a6c6565c457011d7579b522086b5de2a5dfa4e5dac82d1b984f5c1269eae40b6e0b2eebf3e16bb71f9c5c4b02c1737432efd05f6e43a7d75f6ac08576f13403641516741b44ccc27a8998ff2874b4c682646ac49690470665d62d584f8aa996e1c1ae8e5696041fcc3392fb2370b656c8db258a7320d7e017df0817d9ba6a3140ce0fc0a979c9a1237cb43c48fbb9c89fd23c7df6dbe154a0be16157b53a654cd712edf947b190f65333630f7e6bb20cc9a914a10d25e16b06f773d567e5158e8822d2fb848d634bb4eeef864cec145d8dcf54a1fa246f52396bcb7c1d92bbdbc2a0d0fccee299dc2595a15e71d7da41b22390114e93ee9eb1a25dcf817ec36b11344ccc87ac02aa0e392a34b1c878179cdfff96d0508395504023486a1ca079c5b527cec51630409fb2257147c0f43456ad2929149e1471dcc105cb960d465785896b79dcbcce9dc906572243fb8a62721f29013cfb5468bc60a6d8a5f9339abaca7098df52d0c9d1fb6dd77682517fab78f16e88f912b3dabd2b62cbbad48c7595f6669739009043248bcea6b7062459d0ef6ab8145a77436125a066133b00d183fb02a3b4c276e249785a5660e2506d2e1c67ddcb4753d79e1bb95da11648d525f1fbdf79f01856bdac76b97e75847efabf392e98d0fc95c7299d28cf4208be8129391323b70db76646368572a05a3113bbeb0c0449d3e19e19e5bdfa2092d35116ed88ec4464bbd34a543d5b0b40cbf0292ba2fa059cc6e9ad4909f8e3cfcfb2c7c65d6d67e5a28f0493bb9111a996be462a976881c5e57b1c162103248ecf3e5aff0095c75338f6e748b2d5d647d0a67cd39ad1a2c7bd7ea75ea44f613028c97c6e724dd2ab040e802d8d8424919408271d1ab00c55be93210b85b639313299383084436b0b789f6d577903fe02897b8bdaa015aef63c4c7bfbe2e6ee4775c111a3b6843b0210d354acecb27b62477ecd6406131a20d8b8cd7105efceff6b561386c81ec80b8d065053c5c20da4fb2dcd23095d7b6d08d73b471c5c9282657a0457d5c9aa07c7d98bb859c5593f2c866097f7286ec3ef18bdfc70ebbf786d1f0d039c9cfb9c0644ae97506f07ea3be8f2241369574a5c2fa8b23a52ea93639decadb90645b98bb56ff9361d56719e2354c1eacdbfa0516e0b2225766dd44966ba150d3144a75a86da8dedfb45d7b2604fa992ef3378f596c669c67541e87c1d72037f9c7bb000e8b359271d66fd10285f4cbef5e323eb2756ea4a2dfee946bcd7ed334bf1ab07e40568cc7aeb8fde5cc24dce99b448cd7e6a0464bf5a838bf4f467976eb377fc946ebff66c4861679ec24d9e0bedf763b7acfaa51f4d362cb816acb7d6ddec1b468f44f3566f79785dc49b80dad2a2c8b8691b0d994e833af294655d09eebf9294a6e1ff2280ec5354e5bd6b3040ee69ed7af1cb95c62ac32788044bb99e500c6873135d533c2ca68986ebcee4f0d23b22fe0b3867b8dc0f2de3d29e0382ae0708a66230b0d7698d23d61a468902da80b55398c9792615f2c85c67e4a1db770798a49195c6d19ee80552c71a57042646736b97880e8d1928c94dd796d654ef4c40eb03c5d2b60cd9a54815fd8539429aad32bc510bed36b0d7efbdb926db86b2f0bb127c5cd794a78de76f55b510d62724fa266cf008bbce395bc2e296eced3fb4c61dda3b072b2a08c88f38393671f5a4f2130f579d712ae30c349b70b6f206e4e4397ecab1e13f54d5315dc42b9c803d5115fb2c88a113b08e49dfece64a413610e21e0c9cd7ffc5cc357b0b002a0b0d8f89c7ed6af6ad64f79c42a63250c2bd9a66a447f70ea9908c8e1766da7708dad978022b52a883ba0f4e0997ef7dd98b75c3cd460bb40adc51ed3019718b854250c3bfc3323ce4927aace3f091cab40c6dad5e22b8529c535f538f5264ca8fc494157c543f3ebdf608ef6415f40a6bf40bbc068ff9c9011bee6141ed20b01ef4f22556b0651aa9c553011b433fc5f709a769d9a87c8b590498d98a79c72df4be13e188e93021fb62a2f4a0995d6a5d01b2e821b2c8bb1b1ee2eeb1150ee183051e8d931b2483489d0c482cb4ea365aa8fd1a317654ad9a8930cb2a7f93a21a5dcf2e677db3f89d1741097c4e6f338085a61d8fe6bc66fdd6fd5de29334b3c9ac3b74a2799028ccf42d63a42e83fdbe7acd85f6104ed29470b296a72f9e96076eb74086f27e24c6bf3d4365f553f5bd981fcdcf72a5ca0547559029dc39b83642a6835c1bca45a69e42aef71ed8031f2c2450e640b08690ca4fe5dc23dffab82efe3942244d7c7a2457ab0d2ea3713203d7f269b981e5c744e1d7d454e72f2c69ff4423be6c08f6e5ed8c65c39c28b9c55723d52d19f33d80df998b1e1dc07a4aa270e2ffbe6e54b56b7c7b66f0cec5984fa8a7598818264d29bc4ca4c0a3dec8983af7afccf08569f679c506045a226f08e35f4a28fd2991b20acd66f784e48c644e251eac04848947e9f206054692d56f4b8a3f115b85848697be8d2596577bab130e98a18a9f5998dff3ce81746890ca15b0a9a4bb319484669ddaa078a1b18ddcdc948179b6a1a54e075d22a47aeca8360a38d3be799cf19a089191d3330fad1afa5713b97b9491357c0f277bee4624c590f9f2ca0b73d3bdb9f748e311aeb6eb3d51365eea8866918c0f74a1b85295a3813a32f60d06b36e11e8a6ab4c0c7cda1ebb61049fd792eb6ec4d2c1baa22ccc8b2e7377e548d21ea5d64e216b0a8816e70869fe85b72dc28a1ce9d2cce7f700929b525ac1b309fbcfe03080935aaeccfde698460e2f3d8dd140ae2b97e9859ecaf079cd0c73ca3767e6b6234f14945f93c564d2c27c93ce4d0c2bee8e8bf63ef7a1a905091d63d162b933f904a5b6f835bb600dbd277926311cf782980a64cdc6d654bca882484af502b0057a861d5d31d52ded583ddcb01b8711fa219ecbbe5231411c03e66dcfcd9aff3c02491a0fb3bd3071d5bba56de977c41259d92d3d00b6be118f78f173c9b1c2f02829bbc63e2022bfbf39d677ec3df4075dde34acfb8c23cbce9d1e0dc12ba57b0f70921c95ff5ff9b64a4a186364dd63436bd94b4cc386664cf568bbc7a87c0803612589e85674191527f6c93c7eda6e4e8f5a6e56978ef9c8d59d0ae66917a100ca213a24df17cc7f185f172a725263836a4c17857ecc5f8af00711e2b96fdb94972ea85d36f970b3faff2ffb030e70e8a6386a8cadb8a153", 0x2000, &(0x7f00000072c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006dc0)={0x90}, 0x0, 0x0, 0x0, 0x0}) 02:37:20 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2500, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:20 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200), 0x2) r1 = memfd_create(&(0x7f0000000000)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x2) ftruncate(r1, 0xffff) fcntl$addseals(r1, 0x409, 0x7) memfd_create(&(0x7f0000000040)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x6) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32=r1, @ANYBLOB="0000000000100000000000000080"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 02:37:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2010, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000040)="1396e6c9a4033583fbf3f9ea", 0xc) 02:37:21 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000cc0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)}], 0x2, 0x0) 02:37:22 executing program 4: clock_gettime(0x2, &(0x7f0000001d80)) 02:37:22 executing program 3: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigsuspend(&(0x7f0000000000), 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xb) ptrace$cont(0x420a, r0, 0x8, 0x544000) 02:37:22 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:22 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x36c6, 0x201) 02:37:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x250c, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000640)) 02:37:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2500, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:23 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:23 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl0\x00', 0x0}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000d80)) 02:37:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 02:37:24 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000000340), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x7800, 0x8000, 0xcb18, 0x0, {{0xa, 0x4, 0x0, 0x7, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @private=0xa010100, @local, {[@cipso={0x86, 0x13, 0x3, [{0x7, 0xd, "034eb96eab96fb65bb3ffb"}]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0xb0513f93d6ec2cb3) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000680)={0x8, 0x3f8, 0x7ff, 0x1}, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9fad0343159d4f02}, 0x200c0854) socketpair(0x10, 0x0, 0x2de2, &(0x7f00000007c0)={0xffffffffffffffff}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000800)="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", 0xfa) syz_genetlink_get_family_id$devlink(&(0x7f0000001000), r0) 02:37:24 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:24 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 02:37:24 executing program 3: r0 = io_uring_setup(0x56db, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 02:37:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x260c, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000009680), 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) 02:37:25 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2f00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:25 executing program 5: clone3(&(0x7f0000001300)={0x800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:37:25 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000540)=@abs={0x1}, 0x6e) 02:37:26 executing program 4: fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x33}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev, 0x2, 0x0, 0x0, 0x0, 0xfff, 0x0, r0}) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)={0x98, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x98}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0xedc0) 02:37:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:26 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x159242, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000001580), 0x19001, &(0x7f0000001640)) 02:37:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2f00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c100000000000ffffffff", 0x58}], 0x1) 02:37:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 02:37:27 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:27 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000140)={0x0, 0x0, 0x481c8101, 0x0, 0x0, "6256960442ce07f1e969a355f85d2b1097f943"}) 02:37:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c100000000000ffffffff", 0x58}], 0x1) 02:37:27 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 671.737636][T18093] loop4: detected capacity change from 0 to 264192 [ 671.829779][T18093] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 671.829900][T18093] EXT4-fs (loop4): group descriptors corrupted! [ 671.899914][T18093] loop4: detected capacity change from 0 to 264192 [ 671.908601][T18093] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 671.908713][T18093] EXT4-fs (loop4): group descriptors corrupted! 02:37:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xb11000, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='0', 0x1}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x8802, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 02:37:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:28 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 02:37:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c100000000000ffffffff", 0x58}], 0x1) 02:37:29 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') read$char_raw(r0, 0x0, 0x0) 02:37:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x2}, 0xc, &(0x7f0000000940)={0x0, 0x230f}}, 0x0) 02:37:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c100000000000ffffffff", 0x58}], 0x1) 02:37:30 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 02:37:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4603, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:30 executing program 4: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./bus\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xedc0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) 02:37:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:31 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) r1 = memfd_create(0x0, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x7e5d7f941bc0b431, 0x80, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2208c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe0e0, 0x6}, 0x40, 0x0, 0x5c2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa, r2, 0x0) 02:37:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) preadv(r0, &(0x7f0000000800)=[{&(0x7f00000001c0)=""/223, 0xdf}, {0x0}], 0x2, 0x0, 0x4) 02:37:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0xffc}], 0x0, &(0x7f0000000300)=ANY=[]) 02:37:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4603, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:32 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000a40)=[{&(0x7f0000000700)="f3569a6fd814a3b2f89621920f2401868734ae725a28018dea506d53ca4c8eaab16c23592c836a113707", 0x2a}], 0x1) 02:37:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) r1 = memfd_create(0x0, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x7e5d7f941bc0b431, 0x80, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2208c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe0e0, 0x6}, 0x40, 0x0, 0x5c2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa, r2, 0x0) [ 676.801144][T18171] loop4: detected capacity change from 0 to 512 02:37:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 676.860323][T18171] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983088)! [ 676.871263][T18171] EXT4-fs (loop4): group descriptors corrupted! [ 676.969590][T18171] loop4: detected capacity change from 0 to 512 [ 676.981137][T18171] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 not in group (block 983088)! [ 676.992129][T18171] EXT4-fs (loop4): group descriptors corrupted! 02:37:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000080)={0xffffffc8, 0x0, 0x0, 0x0, 0x0, "e1f67bad56084000"}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f00000000c0)=0x13) 02:37:34 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) 02:37:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) r1 = memfd_create(0x0, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x7e5d7f941bc0b431, 0x80, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2208c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe0e0, 0x6}, 0x40, 0x0, 0x5c2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa, r2, 0x0) 02:37:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)) 02:37:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1c, 0x4) 02:37:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x10d082) r1 = memfd_create(0x0, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x7e5d7f941bc0b431, 0x80, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2208c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe0e0, 0x6}, 0x40, 0x0, 0x5c2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xa, r2, 0x0) 02:37:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x17) 02:37:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000680)={'ip6tnl0\x00', @ifru_settings={0x0, 0x0, @cisco=0x0}}) 02:37:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8935, &(0x7f0000000080)={'wg0\x00', @ifru_mtu}) 02:37:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000080)) r2 = dup3(r0, r0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/4096, 0x1000, 0x140, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}, 0x1, 0x0, 0x0, 0x2}}, 0x80) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @multicast1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x33}, 0x2, 0x6, 0x0, 0x0, 0xfff, 0x80, r6}) bind$packet(r2, &(0x7f0000000240)={0x11, 0xf8, r6, 0x1, 0x7, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2f}}, 0x14) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f00000002c0)=[{0x28, 0x0, 0x0, 0xfffff000}, {0x6, 0x0, 0x0, 0x8}, {0x100, 0x2, 0x8, 0x6}]}, 0x10) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) read(r7, &(0x7f0000000140)=""/194, 0xc2) 02:37:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:37 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 02:37:37 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000002280)={0x10, 0xfffffffffffffff5, r1}, 0x10) 02:37:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x8, 0x3, 0x0, 0x180, 0x1}, 0x40) 02:37:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003840)=[{{&(0x7f0000000380)={0xa, 0x4e22, 0x0, @private1}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}}], 0x2, 0x0) 02:37:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x175c2a06, 0x6, 0x8}, 0x40) 02:37:38 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/213) 02:37:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4008af12, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 02:37:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) sendmmsg$inet6(r0, &(0x7f0000003ac0)=[{{&(0x7f0000000340)={0xa, 0x4e1c, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 02:37:39 executing program 2: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xc0189436, 0xffffffffff600000) 02:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) 02:37:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002380)=[{{&(0x7f0000000040)={0xa, 0x4e28, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000002140)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:37:40 executing program 2: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:40 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) syz_io_uring_setup(0x36a, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) 02:37:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x5, [@func, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum={0x0, 0x9, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @typedef, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x151}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 02:37:40 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, 0x0, 0x0) read$char_usb(r0, &(0x7f0000000180)=""/194, 0xc2) 02:37:41 executing program 2: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x200000, 0x0) 02:37:41 executing program 3: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x5, [@func, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @enum={0x0, 0x9, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @typedef, @const]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xdd}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) [ 685.171856][T18313] ptrace attach of "/root/syz-executor.5"[18311] was attempted by "/root/syz-executor.5"[18313] 02:37:41 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x8980, 0x0) 02:37:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x0, 0x4, 0x0, 0x300}, 0x40) [ 685.859799][T18324] ptrace attach of "/root/syz-executor.3"[18323] was attempted by "/root/syz-executor.3"[18324] 02:37:42 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000700)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x2c}}, 0x0) 02:37:42 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001180)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0}}], 0x2, 0x0) 02:37:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x1d9, 0x0, 0x3}]}) 02:37:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x140d, 0xbf70e7ca8fc8aed}, 0x10}}, 0x0) 02:37:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8982, &(0x7f0000000280)={@empty}) 02:37:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003ac0)=[{{&(0x7f0000000340)={0x2, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000005c0)='5', 0x1}], 0x1, 0x0, 0x60}}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000980)="1d", 0x1}], 0x1, 0x0, 0x6}}], 0x3, 0x0) 02:37:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4008af12, &(0x7f0000000040)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x164}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 02:37:44 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:44 executing program 4: r0 = epoll_create1(0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/unix\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x3, r1, &(0x7f0000000100)={0x10000006}) [ 688.085024][T18362] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:37:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:45 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000700)={0x2c, r0, 0x1, 0x0, 0x0, {0x7}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x2c}}, 0x0) 02:37:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x8, 0x2, 0x0, 0xc, 0x1}, 0x40) 02:37:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002300)={0x18, 0x4, &(0x7f00000020c0)=@framed={{}, [@jmp={0x7, 0x0, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000002140)='syzkaller\x00', 0x1, 0xb8, &(0x7f0000002180)=""/184, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:37:45 executing program 5: select(0x9e, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x2710}) 02:37:45 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c7376d8", 0x4e}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:37:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 02:37:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x1ff, 0x0, 0x6, 0x0, 0x1}, 0x40) 02:37:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x401, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 02:37:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x8, 0x2, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x15000000}, 0x40) 02:37:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1f, &(0x7f0000000080), 0x4) 02:37:47 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000000)={'syzkaller0\x00', @ifru_settings={0x0, 0x0, @cisco=0x0}}) 02:37:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xcb4}, 0x40) 02:37:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 02:37:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb900, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="140000002900055b335a804a8cd0060d0624fcc0", 0x14}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 02:37:49 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 02:37:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000018c0)={0x20, 0x15, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}}, 0x0) 02:37:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto$inet(r1, &(0x7f0000002600)="ce", 0x1, 0x0, &(0x7f00000025c0)={0x10, 0x2}, 0x10) [ 693.884269][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 693.891114][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 02:37:50 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000005c0)=0x10000, 0x4) 02:37:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb900, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc50b, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:50 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000040), 0xc) 02:37:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x44851) 02:37:51 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x4}, 0xc) 02:37:51 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4004000) 02:37:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x2, 0x2, 0x3}, 0x14}}, 0x0) 02:37:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:52 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300), 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:52 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x0) 02:37:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc60b, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="140000002900055b335a804a8cd0060d0624fcc0", 0x14}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) 02:37:53 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000200), &(0x7f0000000240)=0x8) 02:37:53 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCVHANGUP(r0, 0x540b, 0x1000000) [ 697.282969][T18490] netlink: 'syz-executor.3': attribute type 11 has an invalid length. [ 697.292495][T18490] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.3'. 02:37:54 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300), 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfeff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:54 executing program 5: socketpair(0x10, 0x2, 0x95, &(0x7f0000000000)) 02:37:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @mcast2, 0x2}, 0x1c) 02:37:54 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmmsg(r0, &(0x7f00000015c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40012100, 0x0) connect$can_bcm(r0, &(0x7f0000000240), 0x10) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x10f, 0x0, {0x0, 0x2710}, {0x0, 0xea60}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c2ca1020e86b72eb"}}, 0x48}}, 0x0) 02:37:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc70b, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, 0x0, 0x0) 02:37:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:56 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300), 0x0, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:56 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)="e8", 0x1}], 0x1}, 0x0) 02:37:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:56 executing program 4: syz_io_uring_setup(0x5dcd, &(0x7f00000024c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000002580)) syz_io_uring_setup(0xf84, &(0x7f00000025c0)={0x0, 0x8de, 0x1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000002640), &(0x7f0000002680)) 02:37:56 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) 02:37:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 02:37:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)={[{@utf8}, {@errors_recover}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 02:37:57 executing program 4: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 02:37:57 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{0x0}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x402c5828, &(0x7f0000000000)={'wg1\x00'}) 02:37:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000200)={'syztnl2\x00', 0x0}) 02:37:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfeff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:37:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000640)=[{{&(0x7f00000003c0)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x10}}, @ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x80}]}}}], 0x30}}], 0x1, 0x0) 02:37:59 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{0x0}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:37:59 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred], 0x20}, 0x0) 02:38:00 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) recvfrom(r0, 0x0, 0x0, 0x40000042, 0x0, 0x0) 02:38:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 704.964649][T18558] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 704.986626][T18558] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0xffffffffffffffff 02:38:01 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x44c02, 0x0) 02:38:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000005c0)={0x1, 'caif0\x00'}, 0x18) 02:38:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2}}) 02:38:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff00, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:01 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{0x0}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 705.404017][T18606] IPVS: Error connecting to the multicast addr 02:38:02 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff04010009050902"], 0x0) 02:38:02 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201080049db2e08450c10105d6d0000000109021b0001000000000904000001030300000905850b40"], 0x0) 02:38:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) 02:38:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:02 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 706.559382][T11590] usb 5-1: new high-speed USB device number 4 using dummy_hcd 02:38:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 706.739833][ T5] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 706.829426][T11590] usb 5-1: Using ep0 maxpacket: 8 02:38:03 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020}, 0x2020) [ 706.970522][T11590] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 706.979499][ T5] usb 6-1: Using ep0 maxpacket: 8 [ 706.980887][T11590] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 706.981024][T11590] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 0 [ 707.006146][T11590] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 707.021148][T11590] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 707.030740][T11590] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 707.100757][ T5] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 707.112167][ T5] usb 6-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=6d.5d [ 707.122594][ T5] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 707.280560][ T5] usb 6-1: config 0 descriptor?? [ 707.380293][ T5] yurex 6-1:0.0: USB YUREX device now attached to Yurex #0 [ 707.489970][T11590] usb 5-1: config 0 descriptor?? [ 707.536652][ T5] usb 6-1: USB disconnect, device number 4 [ 707.551785][T11590] usb 5-1: NFC: intf ffff888151fe1800 id ffffffff91a6aff0 [ 707.607982][ T5] yurex 6-1:0.0: USB YUREX #0 now disconnected [ 707.758180][ T4693] usb 5-1: USB disconnect, device number 4 02:38:04 executing program 3: syz_usb_connect$uac1(0x1, 0xa2, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x90, 0x3, 0x1, 0xc9, 0x60, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x200}, [@processing_unit={0x7, 0x24, 0x7, 0x2, 0x6, 0xff}, @feature_unit={0x9, 0x24, 0x6, 0x5, 0x6, 0x1, [0x5], 0xff}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x19, 0xee}, @format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0x0, 0x1, 0x81, 0x81, "ea"}]}, {{0x9, 0x5, 0x1, 0x9, 0x400, 0x0, 0x7, 0x9, {0x7, 0x25, 0x1, 0x2, 0x80, 0x6}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0x4, 0x2, 0x0, 0x0, "e4"}, @format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x9, 0x4, 0x0, 0xa7}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x40, 0x0, 0x5, {0x7, 0x25, 0x1, 0x80, 0xff, 0x4000}}}}}}}]}}, &(0x7f0000000600)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x110, 0xe1, 0x6, 0x0, 0x8, 0x5}, 0x1f, &(0x7f0000000040)={0x5, 0xf, 0x1f, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x2, 0x64, 0x209a}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x1, 0xd, 0xf000}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x7, [{0x4, &(0x7f00000000c0)=@lang_id={0x4, 0x3, 0x44a}}, {0x2, &(0x7f0000000240)=@string={0x2}}, {0xd2, &(0x7f0000000280)=@string={0xd2, 0x3, "bd9e37f90963a1b06c5bec177a820c0205545629bee818c2a046032ce2cdfe23e14feac5412766a3cd53690c08f769a3d5129c8659a11ab31b602fab7f0dba3c7ab8e89303660312552f773878c5927407236eb44d91ad0eef1a7f47ab82f045426cc4a72deca05133994e537037fa2840ea8d1b02fd2dfeffa091c094c5b4dd393baa2c316fe611cc4ca3533623f833748965cf1fc3eeb66dfa37513fbab7123b907a37eaaa5c041d34d0d2d996e7664fdb37f2e8605380afd1f2b6c457a1e0503440107fd01d346ad66a87527bb5f6"}}, {0x3, &(0x7f0000000380)=@string={0x3, 0x3, "e4"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x41c}}, {0xe1, &(0x7f0000000480)=@string={0xe1, 0x3, "f58c44d9c0184730242fd15b8adfa83c3a545e22bd0eca5cfc7e2d4e5c85effbf3f24c40f41d764d8296643aa6d79a12ddea9973bc8bb17cadb1e40941dc03c3f6eb186a6ac5b33dae10d490694ccef762d8f5cecf07fa33bb081135823d903ffe0e6b090e46ddc249131c8ec61c473bab530a80327b8b59fab5f96017bf94c58cc9c502d0d9d179523e6670d3ddb634136cf7b9f959b95455a656c107f7dc8ba8b329f2ace29a8c56ff7922beda956a503dffb61d55fdfa9f8f0503fbee59b4789d9c6ddb2ba7503e13c3173872378662e6044f269eba1a69aa02bec7c869"}}, {0x0, 0x0}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00'}, 0x10) 02:38:04 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 708.319712][ T4693] usb 6-1: new high-speed USB device number 5 using dummy_hcd 02:38:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:04 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff04010009050902"], 0x0) [ 708.563114][ T4693] usb 6-1: Using ep0 maxpacket: 8 [ 708.671839][ T1981] usb 4-1: new low-speed USB device number 4 using dummy_hcd [ 708.681429][ T4693] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 708.692795][ T4693] usb 6-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=6d.5d [ 708.702393][ T4693] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 708.812994][ T4693] usb 6-1: config 0 descriptor?? [ 708.875513][ T4693] yurex 6-1:0.0: USB YUREX device now attached to Yurex #0 [ 709.061123][ T1981] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 709.072675][ T1981] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 709.087423][ T5] usb 6-1: USB disconnect, device number 5 [ 709.108080][ T5] yurex 6-1:0.0: USB YUREX #0 now disconnected [ 709.340898][ T1981] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 709.350262][ T1981] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 709.358408][ T1981] usb 4-1: Product: 麽路按낡孬៬艺Ȍå…⥖수䚠Ⰳ췢â¾ä¿¡ì—ªâê¦å౩ê©á‹•èšœê…™ëŒšæ€›ê¬¯àµ¿ã²ºë¡ºé¨æ˜ƒáˆƒâ½•ã¡·ì•¸ç’’⌇둮é…ອ᫯ä¿èŠ«ä—°æ±‚Ꞔ冠餳åŽã°â£ºî©€á®ï´‚︭ꃿ삑얔㬹Ⲫ漱ᇦ䳌厣⌶ã¸è¥´ì½¥ìŒŸë›®ï©­å„·ë¨¿áŠ·é€»ãºê«ªÑœãí‹é›™æ›§ïˆ·æƒ¨è“톯뛲埄ã‘á€í¿ã홪èªç­’ïšµ [ 709.399678][ T4693] usb 5-1: new high-speed USB device number 5 using dummy_hcd 02:38:05 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) 02:38:05 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 709.645151][ T4693] usb 5-1: Using ep0 maxpacket: 8 [ 709.775305][ T4693] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 709.786644][ T4693] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 709.796837][ T4693] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 0 [ 709.806868][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 709.820129][ T4693] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 709.829534][ T4693] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 709.969751][ T1981] usb 4-1: 0:2 : does not exist [ 710.016161][ T1981] usb 4-1: USB disconnect, device number 4 02:38:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x80040, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 710.073987][ T4693] usb 5-1: config 0 descriptor?? [ 710.152740][ T4693] usb 5-1: NFC: intf ffff88815423e800 id ffffffff91a6aff0 [ 710.374289][ T1981] usb 5-1: USB disconnect, device number 5 02:38:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:38:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 710.639160][ T3475] usb 4-1: new low-speed USB device number 5 using dummy_hcd [ 711.060460][ T3475] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 711.070956][ T3475] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 02:38:07 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1", 0x27}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:07 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff04010009050902"], 0x0) 02:38:07 executing program 3: syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x1c50c1) r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000440)=ANY=[@ANYBLOB="120100000900000825056a42070000080001090224ffff050074980904000012070103000905010200ffe000000905820241"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x1}}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_dev$hidraw(0xffffffffffffffff, 0x0, 0x161f42) syz_usb_disconnect(r0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[], 0x0) 02:38:07 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOCTL_STOP_ACCEL_DEV(r0, 0x40096101, &(0x7f0000000140)) [ 711.647031][ T3475] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 711.656414][ T3475] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 711.664843][ T3475] usb 4-1: Product: 麽路按낡孬៬艺Ȍå…⥖수䚠Ⰳ췢â¾ä¿¡ì—ªâê¦å౩ê©á‹•èšœê…™ëŒšæ€›ê¬¯àµ¿ã²ºë¡ºé¨æ˜ƒáˆƒâ½•ã¡·ì•¸ç’’⌇둮é…ອ᫯ä¿èŠ«ä—°æ±‚Ꞔ冠餳åŽã°â£ºî©€á®ï´‚︭ꃿ삑얔㬹Ⲫ漱ᇦ䳌厣⌶ã¸è¥´ì½¥ìŒŸë›®ï©­å„·ë¨¿áŠ·é€»ãºê«ªÑœãí‹é›™æ›§ïˆ·æƒ¨è“톯뛲埄ã‘á€í¿ã홪èªç­’ïšµ [ 711.963648][T18736] QAT: Device 0 not found 02:38:08 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1", 0x27}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 712.009348][ T3475] usb 4-1: can't set config #1, error -71 02:38:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 712.063198][ T3475] usb 4-1: USB disconnect, device number 5 02:38:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, @qipcrtr, @in, @sco}) [ 712.211237][ T18] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 712.479728][ T18] usb 5-1: Using ep0 maxpacket: 8 [ 712.580884][ T3475] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 712.630958][ T18] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 712.641443][ T18] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 712.652941][ T18] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 0 [ 712.663229][ T18] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 712.676421][ T18] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 712.685851][ T18] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:38:09 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1", 0x27}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 712.889946][ T3475] usb 4-1: Using ep0 maxpacket: 8 02:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) [ 712.979455][ T18] usb 5-1: config 0 descriptor?? [ 713.047613][ T3475] usb 4-1: config index 0 descriptor too short (expected 65316, got 36) [ 713.056381][ T3475] usb 4-1: config 5 has too many interfaces: 255, using maximum allowed: 32 [ 713.066839][ T3475] usb 4-1: config 5 has 1 interface, different from the descriptor's value: 255 [ 713.076408][ T3475] usb 4-1: config 5 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 713.087684][ T3475] usb 4-1: config 5 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 713.097938][ T3475] usb 4-1: config 5 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 65 [ 713.108073][ T3475] usb 4-1: config 5 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 713.144101][ T18] usb 5-1: NFC: intf ffff888112f9b000 id ffffffff91a6aff0 [ 713.299216][T11590] usb 5-1: USB disconnect, device number 6 [ 713.425680][ T3475] usb 4-1: New USB device found, idVendor=0525, idProduct=426a, bcdDevice= 0.07 [ 713.435056][ T3475] usb 4-1: New USB device strings: Mfr=0, Product=8, SerialNumber=0 [ 713.443412][ T3475] usb 4-1: Product: syz [ 713.516740][T18740] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 713.538420][T18740] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 713.585778][ T3475] hub 4-1:5.0: bad descriptor, ignoring hub [ 713.592200][ T3475] hub: probe of 4-1:5.0 failed with error -5 02:38:10 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a3917911", 0x3b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 713.832564][ T3475] usblp 4-1:5.0: usblp0: USB Bidirectional printer dev 6 if 0 alt 0 proto 3 vid 0x0525 pid 0x426A 02:38:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x80040, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xe0ffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:10 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff04010009050902"], 0x0) [ 714.151069][ T8885] usb 4-1: USB disconnect, device number 6 [ 714.174971][ T8885] usblp0: removed [ 714.589962][ T8885] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 714.769684][ T1981] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 714.839517][ T8885] usb 4-1: Using ep0 maxpacket: 8 [ 714.959510][ T8885] usb 4-1: config index 0 descriptor too short (expected 65316, got 36) [ 714.968215][ T8885] usb 4-1: config 5 has too many interfaces: 255, using maximum allowed: 32 [ 714.977395][ T8885] usb 4-1: config 5 has 1 interface, different from the descriptor's value: 255 [ 714.986858][ T8885] usb 4-1: config 5 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 714.998293][ T8885] usb 4-1: config 5 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 715.009725][ T8885] usb 4-1: config 5 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 65 [ 715.020054][ T8885] usb 4-1: config 5 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 715.089931][ T1981] usb 5-1: Using ep0 maxpacket: 8 [ 715.214777][ T1981] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 715.225227][ T1981] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 715.235318][ T1981] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 0 [ 715.245378][ T1981] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 715.258591][ T1981] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 715.268097][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 715.403899][ T1981] usb 5-1: config 0 descriptor?? [ 715.450990][ T1981] usb 5-1: NFC: intf ffff8880a6270400 id ffffffff91a6aff0 02:38:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bond_slave_0\x00'}) 02:38:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000014c0)={&(0x7f0000001500)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}, 0x8080) sendto$inet6(r0, &(0x7f0000000000)='n', 0x628, 0xdc05, 0x0, 0x0) 02:38:11 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a3917911", 0x3b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 715.549285][ T8885] usb 4-1: New USB device found, idVendor=0525, idProduct=426a, bcdDevice= 0.07 [ 715.558534][ T8885] usb 4-1: New USB device strings: Mfr=0, Product=8, SerialNumber=0 02:38:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 715.670018][ T4693] usb 5-1: USB disconnect, device number 7 [ 715.685545][ T8885] usb 4-1: can't set config #5, error -71 [ 715.740939][ T8885] usb 4-1: USB disconnect, device number 7 02:38:12 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a3917911", 0x3b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4100012, r0, 0x0) pipe(&(0x7f0000000640)) 02:38:13 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) 02:38:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000500), 0x0) 02:38:13 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80", 0x45}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) sendmmsg$unix(r0, &(0x7f0000001800)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}], 0x1, 0x0) 02:38:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xe0ffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:13 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) 02:38:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x40) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="06000000000000000a004e2000000000fe8000000000000000000000000000aa00000000e9a687000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000005"], 0x310) 02:38:14 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80", 0x45}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:14 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000040)) 02:38:14 executing program 4: write$hidraw(0xffffffffffffffff, 0x0, 0x0) 02:38:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @private2}, 0x80) 02:38:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000300)=0x5, 0x4) 02:38:15 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80", 0x45}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:15 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff04010009050902"], 0x0) 02:38:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) 02:38:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2040000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:15 executing program 3: sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0xffffff7f) [ 719.559458][ T5] usb 5-1: new high-speed USB device number 8 using dummy_hcd 02:38:15 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 719.800657][ T5] usb 5-1: Using ep0 maxpacket: 8 [ 719.921480][ T5] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 719.932110][ T5] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 719.942305][ T5] usb 5-1: config 0 interface 0 altsetting 0 bulk endpoint 0x9 has invalid maxpacket 0 [ 719.952395][ T5] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 719.965686][ T5] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 719.975295][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:38:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}], 0x1, 0x0) [ 720.368028][ T5] usb 5-1: config 0 descriptor?? [ 720.426950][ T5] usb 5-1: NFC: intf ffff8880ae63f800 id ffffffff91a6aff0 02:38:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f00000025c0)=[{{0x0, 0x0, 0x0, 0x700}}], 0x1, 0x0) [ 720.617375][ T5] usb 5-1: USB disconnect, device number 8 02:38:17 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'ip6gretap0\x00', &(0x7f0000000200)=@ethtool_cmd={0x19}}) 02:38:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000001, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2842090, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:17 executing program 4: syz_usb_connect(0x0, 0x36, 0x0, 0x0) 02:38:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x1600bd63, &(0x7f0000000040), 0x4) 02:38:17 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:18 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x5f2f2ceb4495d073, 0x800}, 0x20) 02:38:18 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:18 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netlink(r0, &(0x7f0000000580)=@unspec, 0xc) 02:38:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 02:38:19 executing program 4: syz_usb_connect(0x0, 0x36, 0x0, 0x0) 02:38:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000002, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000100)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="fe000008000000002900000036bf1250440369becb0635f7bc00"/36], 0x18}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000340)={'wlan1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000001c0)={0x20, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x64, r5, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x2, 0x21}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_SSID={0x24, 0x34, @random="0faa19c21d184d50bc1320606216010d2276f7604d1307c5e95268433b93fc40"}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x890b, &(0x7f0000000340)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3c, r4}) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', r7, 0x2f, 0x6, 0xff, 0x577e, 0x20, @remote, @mcast1, 0x8, 0x0, 0x8, 0x9c}}) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@empty}, &(0x7f0000000300)=0x14) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000540)={0x84, 0x2, '\x00', [@ra={0x5, 0x2, 0x81}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x400}, @ra={0x5, 0x2, 0x4}]}, 0x20) sendmsg$TIPC_CMD_SET_LINK_TOL(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x68, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0xbc, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008000) r8 = accept4(r6, &(0x7f0000000580)=@generic, &(0x7f0000000600)=0x80, 0x100000) sendmsg$NL80211_CMD_SET_POWER_SAVE(r8, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x68, r5, 0x8, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x77}}}}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}, @NL80211_ATTR_PS_STATE={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x0) 02:38:19 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 02:38:20 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000001d00)) 02:38:20 executing program 4: syz_usb_connect(0x0, 0x36, 0x0, 0x0) 02:38:20 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:20 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000014c0)={&(0x7f0000000000)={0xa, 0x6e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}, 0x8080) sendto$inet6(r0, 0x0, 0x8, 0x0, 0x0, 0x0) 02:38:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x5452, &(0x7f0000000340)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}) 02:38:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:21 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e", 0x4a}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$netlink(r0, 0x0, 0x0) 02:38:21 executing program 5: socketpair(0xa, 0x2, 0x9d, &(0x7f0000000000)) 02:38:21 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[], 0x0) 02:38:22 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c", 0x4b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'veth1\x00', @ifru_addrs=@in={0x2, 0x0, @remote}}) [ 726.509522][ T18] usb 5-1: new high-speed USB device number 9 using dummy_hcd 02:38:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:22 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c", 0x4b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:23 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x7fffffff}, 0x8) 02:38:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000001, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 726.710160][ T18] usb 5-1: device descriptor read/64, error 18 [ 726.979224][ T18] usb 5-1: new high-speed USB device number 10 using dummy_hcd 02:38:23 executing program 3: sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000001c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01030000008008000100", @ANYRES32=r2], 0x20}}, 0x0) [ 727.179306][ T18] usb 5-1: device descriptor read/64, error 18 [ 727.304992][ T18] usb usb5-port1: attempt power cycle 02:38:23 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c", 0x4b}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000005080)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) [ 728.059641][ T18] usb 5-1: new high-speed USB device number 11 using dummy_hcd 02:38:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f0000001e40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=[@dstopts={{0xf}}], 0x18}}], 0x1, 0x0) [ 728.260581][ T18] usb 5-1: device descriptor read/8, error -61 02:38:24 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, 0x14, 0x1, 0x0, 0x0, {0x1}, [@INET_DIAG_REQ_BYTECODE={0x12, 0x1, "900002844c0001b39e157966d13d"}]}, 0x28}}, 0x0) [ 728.529285][ T18] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 728.740502][ T18] usb 5-1: device descriptor read/8, error -61 [ 728.873525][ T18] usb usb5-port1: unable to enumerate USB device 02:38:25 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[], 0x0) 02:38:25 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2040000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:25 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 02:38:25 executing program 5: r0 = socket(0x11, 0xa, 0x0) bind$xdp(r0, 0x0, 0x0) 02:38:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="5adc9b9732061af812db994cd3e78ad92425298e95ca37d975ff7c7720d98b7f64857eeba34ac39f9ec13b1a0e4658e3c32f4824ec", 0x35}], 0x1, 0x0, 0x1c0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:38:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 02:38:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 730.239389][T11590] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 730.449700][T11590] usb 5-1: device descriptor read/64, error 18 [ 730.729555][T11590] usb 5-1: new high-speed USB device number 14 using dummy_hcd 02:38:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000140)=@nl=@proc, 0x80) [ 730.943519][T11590] usb 5-1: device descriptor read/64, error 18 02:38:27 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2204080, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 731.070130][T11590] usb usb5-port1: attempt power cycle [ 731.819369][T11590] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 732.040300][T11590] usb 5-1: device descriptor read/8, error -61 [ 732.311759][T11590] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 732.520256][T11590] usb 5-1: device descriptor read/8, error -61 [ 732.657159][T11590] usb usb5-port1: unable to enumerate USB device 02:38:29 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[], 0x0) 02:38:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6040000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:29 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) 02:38:29 executing program 5: r0 = socket(0x10, 0x2, 0x0) read$alg(r0, 0x0, 0x0) 02:38:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:29 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004980)=[{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="c4", 0x1}], 0x1}], 0x1, 0x0) 02:38:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000300), r0) [ 733.819696][ T18] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 734.023692][ T18] usb 5-1: device descriptor read/64, error 18 [ 734.033076][T19084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:38:30 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 734.299366][ T18] usb 5-1: new high-speed USB device number 18 using dummy_hcd 02:38:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) [ 734.493929][ T18] usb 5-1: device descriptor read/64, error 18 [ 734.619766][ T18] usb usb5-port1: attempt power cycle [ 735.339252][ T18] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 735.527370][ T18] usb 5-1: device descriptor read/8, error -61 [ 735.809194][ T18] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 736.029533][ T18] usb 5-1: device descriptor read/8, error -61 [ 736.154587][ T18] usb usb5-port1: unable to enumerate USB device 02:38:32 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) 02:38:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mreq(r0, 0x29, 0x1a, 0x0, 0x0) 02:38:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x30c0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x9}, 0x4) 02:38:32 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f0000001e40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) 02:38:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x20000091) [ 737.279414][ T18] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 737.479553][ T18] usb 5-1: device descriptor read/64, error 18 02:38:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 737.749836][ T18] usb 5-1: new high-speed USB device number 22 using dummy_hcd 02:38:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) recvmsg(r0, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) 02:38:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x20000091) [ 737.942593][ T18] usb 5-1: device descriptor read/64, error 18 [ 738.075128][ T18] usb usb5-port1: attempt power cycle [ 738.829261][ T18] usb 5-1: new high-speed USB device number 23 using dummy_hcd [ 739.010098][ T18] usb 5-1: device descriptor read/8, error -61 [ 739.289746][ T18] usb 5-1: new high-speed USB device number 24 using dummy_hcd [ 739.469641][ T18] usb 5-1: device descriptor read/8, error -61 [ 739.591691][ T18] usb usb5-port1: unable to enumerate USB device 02:38:36 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) 02:38:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:36 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x40) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000000}, 0x1c) 02:38:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x20000091) 02:38:36 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x20000091) 02:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000001c0)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001c00), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000008008000100", @ANYRES32=r4], 0x20}}, 0x0) [ 740.790382][ T3475] usb 5-1: new high-speed USB device number 25 using dummy_hcd [ 740.999218][ T3475] usb 5-1: device descriptor read/64, error 18 [ 741.279310][ T3475] usb 5-1: new high-speed USB device number 26 using dummy_hcd 02:38:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) [ 741.492852][ T3475] usb 5-1: device descriptor read/64, error 18 02:38:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 741.619623][ T3475] usb usb5-port1: attempt power cycle [ 742.349384][ T3475] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 742.541110][ T3475] usb 5-1: device descriptor read/8, error -61 [ 742.809603][ T3475] usb 5-1: new high-speed USB device number 28 using dummy_hcd [ 742.980698][ T3475] usb 5-1: device descriptor read/8, error -61 [ 743.104316][ T3475] usb usb5-port1: unable to enumerate USB device 02:38:39 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) 02:38:39 executing program 3: unshare(0x6c0100) 02:38:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 02:38:39 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:40 executing program 5: socketpair(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:38:40 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$inet(r0, &(0x7f0000000080), 0x15, 0x0) 02:38:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 744.529440][ T8456] usb 5-1: new high-speed USB device number 29 using dummy_hcd [ 744.719858][ T8456] usb 5-1: device descriptor read/64, error 18 [ 744.999407][ T8456] usb 5-1: new high-speed USB device number 30 using dummy_hcd 02:38:41 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:41 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0) 02:38:41 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x0}, 0x48) [ 745.233733][ T8456] usb 5-1: device descriptor read/64, error 18 [ 745.359577][ T8456] usb usb5-port1: attempt power cycle [ 746.099362][ T8456] usb 5-1: new high-speed USB device number 31 using dummy_hcd [ 746.293008][ T8456] usb 5-1: device descriptor read/8, error -61 [ 746.569328][ T8456] usb 5-1: new high-speed USB device number 32 using dummy_hcd [ 746.761756][ T8456] usb 5-1: device descriptor read/8, error -61 [ 746.880635][ T8456] usb usb5-port1: unable to enumerate USB device 02:38:43 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902"], 0x0) 02:38:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6040000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000040), 0x4) 02:38:43 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast2}}}], 0x20}}], 0x1, 0x0) 02:38:43 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0x300, 0x3f8, 0xf0, 0x1c8, 0xf0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@dev}}}, {{@ipv6={@empty, @private1, [], [], 'wg2\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) [ 747.849438][ T4693] usb 5-1: new high-speed USB device number 33 using dummy_hcd 02:38:44 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}, 0x0) [ 748.089786][ T4693] usb 5-1: Using ep0 maxpacket: 8 [ 748.210923][ T4693] usb 5-1: config 0 has no interfaces? [ 748.216601][ T4693] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 748.226135][ T4693] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 748.372889][ T4693] usb 5-1: config 0 descriptor?? 02:38:44 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0x300, 0x3f8, 0xf0, 0x1c8, 0xf0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@dev}}}, {{@ipv6={@empty, @private1, [], [], 'wg2\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) [ 748.616759][ T4693] usb 5-1: USB disconnect, device number 33 02:38:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xd000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:45 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902"], 0x0) 02:38:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000080)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000100)="a170a27b6c99d2e3b817ab64efd25227e90cb27c759e66b6c4cd4eefe60ee10b146c3fffe147ca58f92860bfa8ebd08b3165f187efa0187f2f307b810c7dd95cae991b8977789c5405539fa2415056c20ee2243ad30105c6cfbdb3f67eb6160b70cc75e53a6e070a0d19fe35c44b25fb6804d453d924b969adbbcf7668b6dae653ebca7f370c3ef16841db892a8218fe9458de316a6fba81d593220b34f04ee4962ca43252b673475d9892010fcb1c0be5ba167b59d2301b701cdd4661e6afe00f3b47eea4884d5a0787281462f357297095ecf6672fa266ac77c12b421dfef076019b17129a78b4f40c8e4150825919b52278b54b92acc8b38e35fe", 0xfc}, {&(0x7f0000000200)="5adc9b9732061af812db994cd3e78ad92425298e95ca37d975ff7c7720d98b7f64857eeba34ac39f9ec13b1a0e4658e3c32f4824ec25115a218d6cccd0d806597b1f798cfb85364c46f21015ee5d6f30d2e6951833e343cec16636bea1022e3be1ebf9e2239188814d01863549d3a6f0d4a956f7471b31c24519bfb02f0b2eb72c4219c6f6d4724c8afbe599fa417f4a1a30d324ba1c032296839560a8d66273ad0f3a02ec7091c0e0a6b8176d5ad9065dd49c35b962f25669d30ab355cb5ac19c5e64605b6a8e77cd61fc2b57ac5853d8954f6df79acd913e", 0xd9}, {&(0x7f0000000000)="bfe6496d358de16aebfe22cee6d91d136d267c38a6b40c52bee674cf9e", 0x1d}, {&(0x7f0000000640)="83ffda418db3ae078ef5c50897e1ad03172fbeeb355f8b5f2c8feee9a9fe20db866c068bfd23527353ab768517d7c134a45674f3aaeb571a7f76becbcb61802ba25b81633a01599a0c886ee0ae233685ab5e499d5ae72a78769e517edecd9c78621b", 0x62}, {&(0x7f0000000380)="42881085ccb62787d9119bad73545525ee9d7658c2f73e461a4f761c57b5b20541e956d88fe589bb6e7a7f591adcbae89234a0b597edf17bba7766a5781bdbf9b34c5c9c33b95827ea2338a2f92d24818f3475d6ed75588f9e59af962370e577294a826f286afc6382d14078a1f15529a032b83a8024f725883072940d863fa7c45fcfa404d8bff980013e4742fe48028d6c13d55bb9a3a479fb28475e7460cfd2593ea4745abc2c37b77c724e1be52747ca29616126e079b3bff464fddf9ffb70a67904b5dd49f03126343d79c330fb920f", 0xd2}, {&(0x7f0000000a40)="4ddd318f98ed76c2556469ac876f2d1aee72bfd8efc27b24b49a195c7a0ee69e3536943c59359e9038a479f57e5c7f9096645a771a6f5fedf49c90fcd11edbbda62b260351317438f3b8dba3d940c01b6196ff82355ebd753a78e14e65d67be9e90716273a4b57607457da621f3026ebe333e48ccf66c414a8edc18ecc7f40e0017bbe", 0x83}, {&(0x7f0000000540)="3ad0350f0f7a7158075e6fc35916d4a2823c14458fcd20919da1ebaf162333004ca6591e984366298dacccaef30b212ab41358a06f7ae919eba8266f428fe0a915a9b6ab583d905984661c9a4a5c9169822164d2356b0712a196cbc38f37ea0c47cd10b8448ca82694efd9f34175df16a0bd50b8344bde9e14d2461c6ea54ee61a87e7f9bdddfdfb47fe5134b64ea20613f2fbfb1976fe4556a2e98d983a3b72c15665414ec7640803aba7cc18413f70655d7c6d040455abec6e7940627a52a0db6678f2", 0xc4}], 0x10000000000001b2, &(0x7f00000006c0)=ANY=[], 0x1c0}, 0x0) 02:38:45 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x200000, 0x0) 02:38:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0x300, 0x3f8, 0xf0, 0x1c8, 0xf0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@dev}}}, {{@ipv6={@empty, @private1, [], [], 'wg2\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) 02:38:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x7) 02:38:46 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x540, 0x300, 0x3f8, 0xf0, 0x1c8, 0xf0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@dev}}}, {{@ipv6={@empty, @private1, [], [], 'wg2\x00', 'team_slave_0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a0) [ 750.329883][ T8463] usb 5-1: new high-speed USB device number 34 using dummy_hcd [ 750.589245][ T8463] usb 5-1: Using ep0 maxpacket: 8 02:38:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xe000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 750.710760][ T8463] usb 5-1: config 0 has no interfaces? [ 750.716393][ T8463] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 750.725990][ T8463] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 750.881088][ T8463] usb 5-1: config 0 descriptor?? 02:38:47 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/65, 0x41}], 0x1) 02:38:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) [ 751.145302][ T8463] usb 5-1: USB disconnect, device number 34 02:38:48 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902"], 0x0) 02:38:48 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f0000001e40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}}], 0x1, 0x0) 02:38:48 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)) 02:38:49 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:49 executing program 3: r0 = open(&(0x7f0000000100)='./bus\x00', 0x1fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000200)=ANY=[], 0x1f) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = dup(r1) r3 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 02:38:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 753.073140][T11590] usb 5-1: new high-speed USB device number 35 using dummy_hcd [ 753.184908][ T34] audit: type=1804 audit(1620700729.528:380): pid=19320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir709707129/syzkaller.s5IX7J/402/bus" dev="sda1" ino=14410 res=1 errno=0 02:38:49 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:49 executing program 5: syz_open_dev$evdev(&(0x7f0000000880), 0x9, 0x200) [ 753.340303][T11590] usb 5-1: Using ep0 maxpacket: 8 02:38:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, 0x0, 0x0) [ 753.471485][T11590] usb 5-1: config 0 has no interfaces? [ 753.477252][T11590] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 753.486883][T11590] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 753.614021][T11590] usb 5-1: config 0 descriptor?? [ 753.887278][T11590] usb 5-1: USB disconnect, device number 35 02:38:50 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:51 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee00000001090224000100000000090400"], 0x0) 02:38:51 executing program 3: rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f0000000340)) 02:38:51 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 02:38:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:51 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) vmsplice(r0, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x200000, 0x0) 02:38:51 executing program 5: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/6) 02:38:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f00000034c0)=[{{&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}}], 0x1, 0x0) [ 755.324169][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 755.330770][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 [ 755.539520][ T8463] usb 5-1: new high-speed USB device number 36 using dummy_hcd [ 755.779485][ T8463] usb 5-1: Using ep0 maxpacket: 8 [ 755.920759][ T8463] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 755.931353][ T8463] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 755.940862][ T8463] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 756.150611][ T8463] usb 5-1: config 0 descriptor?? 02:38:52 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 02:38:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 02:38:52 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) 02:38:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x11000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 756.460597][ T8463] usb 5-1: USB disconnect, device number 36 02:38:53 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee00000001090224000100000000090400"], 0x0) 02:38:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:53 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xd0, 0x1c8, 0xd0, 0x1c8, 0xd0, 0x2c0, 0x2e8, 0x2e8, 0x2e8, 0x2c0, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'bridge0\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@dscp={{0x28}}]}, @REJECT={0x28}}, {{@ipv6={@loopback, @mcast2, [], [], 'bridge_slave_1\x00', 'ipvlan0\x00', {}, {}, 0x11, 0x0, 0x1}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@multiport={{0x50}, {0x2}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x418) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000a40)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:38:53 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 02:38:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @empty}, 0xc) 02:38:54 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200000, 0x0) 02:38:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x8}}}}}, 0x0) 02:38:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 757.940172][ T18] usb 5-1: new high-speed USB device number 37 using dummy_hcd [ 758.199581][ T18] usb 5-1: Using ep0 maxpacket: 8 02:38:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x12000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 758.323055][ T18] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 758.333498][ T18] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 758.342993][ T18] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:38:54 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) [ 758.568518][ T18] usb 5-1: config 0 descriptor?? 02:38:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 02:38:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 758.817098][ T18] usb 5-1: USB disconnect, device number 37 02:38:55 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee00000001090224000100000000090400"], 0x0) 02:38:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000080)={0xa, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}, 0x0) 02:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x28, &(0x7f0000000080)="7457891cfc8ad5ab2bfafe59fc200af999a9b560bb13896b072ff04eb618d264d8fef54f1fb1afa2"}) 02:38:55 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) 02:38:56 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f00000001c0)="e56584b4aa7e65d017305c1ea57fefb1c5912d759f0f701b3682db56be4842c36615f261c596d1ed3241c172e56e4ce96ff7cca5edb186a39179114247fbdee7d59e444c80c4d5735b6e6c73", 0x4c}], 0x1, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64\x00'}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x0, 0x0) 02:38:56 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000480)) 02:38:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 760.409712][ T1981] usb 5-1: new high-speed USB device number 38 using dummy_hcd 02:38:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f00000009c0)={&(0x7f0000000780)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e23}}, 0x80, 0x0, 0x0, &(0x7f00000043c0)=ANY=[], 0x360}, 0x0) 02:38:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xd000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 760.649435][ T1981] usb 5-1: Using ep0 maxpacket: 8 [ 760.771150][ T1981] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 760.782744][ T1981] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 760.792472][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:38:57 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x3) fcntl$setsig(r1, 0xa, 0x12) r3 = getpgid(0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x0, r3}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) dup2(r1, r2) tkill(r0, 0x15) [ 760.949686][ T1981] usb 5-1: config 0 descriptor?? 02:38:57 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), 0xffffffffffffffff) [ 761.196742][ T1981] usb 5-1: USB disconnect, device number 38 02:38:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 02:38:58 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401"], 0x0) 02:38:58 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000003400), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20000009}) 02:38:58 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x200}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r1, 0x0, 0xf6c1) 02:38:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20100000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xe000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:38:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000001a00)={'wg1\x00'}) 02:38:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000040)=0x3, 0xfd86) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x2) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 762.939256][T11590] usb 5-1: new high-speed USB device number 39 using dummy_hcd 02:38:59 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000005c0), 0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000440)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd00|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00\xfa\xee&\x028\x8d\a\x02?\x9fs\xb9\xfb\r\xa0\xaa\t\xe4\x9asq\x8e\xd7\xed[\xa3\xa0j\x15\x80\xa7\xac@\xc1\x90\xffT\x10\xea\xa7\x15j5\x99\xe7\x1d\xc3`Gn\xdaD\x01W\x9f\xdb7\xec\xcfm,}Q\xa5x\xa5 \x13\x95,\xff.\xbe\x0f\x9b\x81\a\xccgj\xc3\xb3#6*\xef\xbccP\xb8\x83\xdc`oh\tM[0\x814\rN\xd4F\x00 E\xdb\x0f\x8b\xda2c\x93\xf0lJT\xdf\r\xae\x05\x87\xe9@\x86\x1dHc\xbd\x1f\x12\xae\xb4\xc4\x86\x1c\xf6XW\xdei.P\x1f\xef5\x111\xf2\x04cyQ\x91\xf2\x1a\xed]]\x05\xad', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc40001e1) [ 763.189573][T11590] usb 5-1: Using ep0 maxpacket: 8 02:38:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) [ 763.331158][T11590] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 763.343036][T11590] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 763.356609][T11590] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 763.365978][T11590] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 763.640484][T11590] usb 5-1: config 0 descriptor?? [ 763.733119][T11590] usb 5-1: NFC: intf ffff8881294f2400 id ffffffff91a6aff0 [ 763.921505][T11590] usb 5-1: USB disconnect, device number 39 02:39:00 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000008bc0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 02:39:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}], 0x2}, 0x0) 02:39:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x240c0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 02:39:00 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401"], 0x0) 02:39:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="36786705115253c50a3015daefacaf", 0xf}, {0x0}, {&(0x7f0000000180)="f0", 0x1}], 0x3, &(0x7f0000000380)=[@ip_ttl={{0x14}}], 0x18}}], 0x1, 0x0) 02:39:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000033c0)={0x0, 0x0, &(0x7f0000003380)={0x0}}, 0x0) [ 765.380006][ T1981] usb 5-1: new high-speed USB device number 40 using dummy_hcd [ 765.619571][ T1981] usb 5-1: Using ep0 maxpacket: 8 [ 765.740530][ T1981] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 765.751025][ T1981] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 765.764333][ T1981] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 765.773737][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:39:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x12) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) mknod(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x2}, &(0x7f0000000040)=0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timer_settime(r1, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002, 0x0, @empty}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1, 0x0) umount2(0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 02:39:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 765.948543][ T1981] usb 5-1: config 0 descriptor?? [ 766.008395][ T1981] usb 5-1: NFC: intf ffff8880afe40c00 id ffffffff91a6aff0 02:39:02 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000020c0)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002400)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 02:39:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x25000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 766.195223][ T1981] usb 5-1: USB disconnect, device number 40 02:39:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:03 executing program 2: getrusage(0xffffffffffffffff, &(0x7f00000002c0)) 02:39:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000041c0)={0x0, @in={0x2, 0x0, @multicast2}, @qipcrtr, @can}) 02:39:03 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401"], 0x0) 02:39:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 02:39:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001440)=""/249, 0xf9}, {&(0x7f0000000440)=""/4080, 0xff0}], 0x2}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e000103c8c4ee7cc152000000000000ad1a66d51f"], 0x1c}}, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 02:39:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x250c0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 768.059485][ T4693] usb 5-1: new high-speed USB device number 41 using dummy_hcd 02:39:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x11000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 768.749213][ T4693] usb 5-1: Using ep0 maxpacket: 8 [ 768.870530][ T4693] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 768.881017][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 768.894523][ T4693] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 768.904067][ T4693] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 769.075532][ T4693] usb 5-1: config 0 descriptor?? [ 769.121558][ T4693] usb 5-1: NFC: intf ffff8881024f0c00 id ffffffff91a6aff0 [ 769.329219][T11590] usb 5-1: USB disconnect, device number 41 02:39:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 02:39:05 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@broadcast, @dev, @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "efca3a", 0x10, 0x11, 0x0, @empty, @mcast2, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 02:39:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 02:39:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x260c0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:06 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401000905"], 0x0) 02:39:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 02:39:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000c00)={0x0, 0x0, 0x0}, 0x0) 02:39:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x12000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 770.969810][ T4693] usb 5-1: new high-speed USB device number 42 using dummy_hcd 02:39:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[{0x10, 0x1, 0x1}], 0x10}}], 0x1, 0x0) [ 771.209425][ T4693] usb 5-1: Using ep0 maxpacket: 8 02:39:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) [ 771.330964][ T4693] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 771.341514][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 771.352347][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 771.365575][ T4693] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 771.375025][ T4693] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 772.065662][ T4693] usb 5-1: config 0 descriptor?? [ 772.145205][ T4693] usb 5-1: NFC: intf ffff888116a5ec00 id ffffffff91a6aff0 02:39:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0xfd86) [ 772.423707][ T1981] usb 5-1: USB disconnect, device number 42 02:39:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2f000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:09 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401000905"], 0x0) 02:39:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, 0x0, 0x0) 02:39:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 774.299313][T11590] usb 5-1: new high-speed USB device number 43 using dummy_hcd 02:39:10 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 02:39:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) 02:39:10 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x348193de}, 0x0, 0x0, &(0x7f0000000180)={0x0}) [ 774.569878][T11590] usb 5-1: Using ep0 maxpacket: 8 [ 774.690909][T11590] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 774.701392][T11590] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 774.713718][T11590] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 774.727047][T11590] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 774.736371][T11590] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:39:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x20100000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 774.943260][T11590] usb 5-1: config 0 descriptor?? [ 774.993180][T11590] usb 5-1: NFC: intf ffff8881024f2800 id ffffffff91a6aff0 [ 775.569810][T11590] usb 5-1: USB disconnect, device number 43 02:39:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[], 0x1d0}}, 0x0) 02:39:12 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x181089, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 02:39:12 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff0401000905"], 0x0) 02:39:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000003200), 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r1, 0x0) 02:39:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:13 executing program 2: clone(0x2200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x97&\x89\\\xd0\xe7\xca\xc7ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2W\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\t\x00\x00\x00}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8b\x9eVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \xf8{^\xd6\xcc\x10\xc1\xb3\x9f\xb8IbR:/q~\xad}\xa1^\xa7\xcd\xe2\xb9\x86\x89\x8e\xf0>\x12\x13\xf5\xe9ho{pI\xac\xbe\x9dBF\xd4\b8\xdd\xf0D\xd21S%\xf7\xf7 G\xc4\'cH\xa8\xcf/\xad\x1d\xbbn\xa6\xe1t<,_\xbcz|0GT\n\xb4\x14\xef\x11&\xb2\xf7\x9d\x81\x9ezJ\x96\xa2\xc2\x14\x0fT\x19D\xe2v0o\x1a\xe2|\xe1\xe5\x80\xbf\x1d\x01\x004L\xea\xfd\x9b\x1e\xdcx\xd4\x16\x17\xb7\x04S\xd8\x18\f\xb5\xe9\x1b.|\xe9\x01\x97*\xf2lty\x0e\x8c4O\xb93\xd7kR\x02\xe1\xd8\x9e\xa9\xee\xcb\xcb<*te\x05\xa4\x85\x93Re\xb0Q\xc2\x9cS\xbbI\xd7\xf0g\xc9\xa5^\xbe\x15R)\x04\x1c?x\'\x9e;\xbb\xa5\xbb\xe8\xfb\xa5\x14z\xdb\xa0<(\xf6\xc8\a~\xcb\x8e\x17+\xc2J\xb5\xffP\x8f\xd8\xcb0\xd0A\xba\x9f`\xae\xbe\x1d\x97\xe4\xf1T{\t\x1e;3\xcb\x8cG\xfb\xb5\xde\x91\\ \xd5\b\xea~\x8b;\xbb\"K\a\xa60\x03\xe5\xcb\xa4/3\xef\xa6\xba\xf8F\x14\x90\x84\xd8>\xd6R\xa7)\x17x>\xee\xcc\xd0\x1f~l\x0fr', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000780)='\x00', 0x0, 0x0, 0x1000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[], 0x12d) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$setlease(r0, 0x400, 0x0) [ 776.890522][ T4693] usb 5-1: new high-speed USB device number 44 using dummy_hcd 02:39:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x25000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000280)=""/68, 0x44) [ 777.129255][ T4693] usb 5-1: Using ep0 maxpacket: 8 [ 777.251027][ T4693] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 777.261484][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 777.273229][ T4693] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 777.286585][ T4693] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 777.295987][ T4693] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 777.643084][ T4693] usb 5-1: config 0 descriptor?? [ 777.681741][ T4693] usb 5-1: NFC: intf ffff888112d57000 id ffffffff91a6aff0 [ 777.897178][ T4693] usb 5-1: USB disconnect, device number 44 02:39:14 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x81}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 02:39:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0, 0x1d0}}, 0x0) 02:39:14 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x6}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 02:39:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x40000800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2f000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:15 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff040100090509"], 0x0) 02:39:15 executing program 5: creat(&(0x7f0000006f80)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) 02:39:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, 0x0, 0x0) [ 779.500068][ T18] usb 5-1: new high-speed USB device number 45 using dummy_hcd [ 779.739213][ T18] usb 5-1: Using ep0 maxpacket: 8 02:39:16 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000940), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000004e00)={0x0, 0x0, &(0x7f0000004dc0)={0x0}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000004f40)={&(0x7f0000004e40), 0xc, &(0x7f0000004f00)={&(0x7f0000004ec0)={0x1c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 779.889876][ T18] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 779.900464][ T18] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 779.910505][ T18] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 779.923623][ T18] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 779.934367][ T18] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 780.307337][ T18] usb 5-1: config 0 descriptor?? 02:39:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x1b2e) 02:39:16 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, 0x0, 0x0) [ 780.391765][ T18] usb 5-1: NFC: intf ffff8881168e4800 id ffffffff91a6aff0 02:39:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x46030000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 780.574345][ T8463] usb 5-1: USB disconnect, device number 45 02:39:17 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[], &(0x7f0000000080), 0x0) 02:39:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000440)='net/raw\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) fchdir(r0) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc4000ee1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 02:39:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rename(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='./file0/file0\x00') 02:39:17 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff040100090509"], 0x0) 02:39:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5423, 0x400007) 02:39:18 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/time_for_children\x00') [ 782.219360][ T5] usb 5-1: new high-speed USB device number 46 using dummy_hcd 02:39:18 executing program 5: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) getrusage(0x1, &(0x7f0000000000)) 02:39:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 782.460133][ T5] usb 5-1: Using ep0 maxpacket: 8 [ 782.580710][ T5] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 782.592154][ T5] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 782.602401][ T5] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 782.615636][ T5] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 782.625035][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 02:39:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x9220d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x368, 0x0, 0x0, 0x200, 0x0, 0x0, 0x298, 0x2e8, 0x2e8, 0x298, 0x2e8, 0x3, 0x0, {[{{@uncond, 0x0, 0x168, 0x1d0, 0x0, {}, [@common=@unspec=@physdev={{0x68}, {'team0\x00', {}, 'wg1\x00', {}, 0x0, 0x6}}, @common=@inet=@hashlimit1={{0x58}, {'vcan0\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 02:39:19 executing program 3: socket(0xa, 0x3, 0x40) [ 782.920255][ T5] usb 5-1: config 0 descriptor?? [ 782.979459][ T5] usb 5-1: NFC: intf ffff888120472000 id ffffffff91a6aff0 [ 783.166773][ T5] usb 5-1: USB disconnect, device number 46 02:39:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040), 0x6) ioctl$sock_bt_hci(r0, 0x400448cb, 0x0) 02:39:19 executing program 2: sysfs$2(0x2, 0x80, 0x0) 02:39:20 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000000c0), 0x6) write$bt_hci(r0, &(0x7f0000000000)={0x1, @set_csb={{0x441, 0xb}}}, 0xf) 02:39:20 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="120100009b6588088612462071ee000000010902240001000000000904000002ff040100090509"], 0x0) 02:39:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}}) 02:39:20 executing program 5: syz_open_dev$dri(&(0x7f00000000c0), 0x3, 0x302) 02:39:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x40000800, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:21 executing program 3: keyctl$update(0x2, 0x0, 0x0, 0x8) 02:39:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) creat(0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x1a8003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 784.820261][ T5] usb 5-1: new high-speed USB device number 47 using dummy_hcd 02:39:21 executing program 5: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') mkdir(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) creat(0x0, 0x0) [ 785.059343][ T5] usb 5-1: Using ep0 maxpacket: 8 [ 785.180943][ T5] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 785.191538][ T5] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 785.201768][ T5] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 785.215166][ T5] usb 5-1: New USB device found, idVendor=1286, idProduct=2046, bcdDevice=ee.71 [ 785.224678][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 785.453507][T19851] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 785.526394][ T5] usb 5-1: config 0 descriptor?? [ 785.568020][T19855] loop5: detected capacity change from 0 to 264192 [ 785.622461][ T5] usb 5-1: NFC: intf ffff888145fd2800 id ffffffff91a6aff0 [ 785.775351][ T5] usb 5-1: USB disconnect, device number 47 02:39:22 executing program 3: syz_mount_image$ext4(&(0x7f0000001780)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000003540)=[{&(0x7f0000002140)="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", 0x3df, 0xc22}], 0x0, &(0x7f0000003600)) 02:39:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x46030000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0xc004743e, 0x0) 02:39:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:22 executing program 2: prctl$PR_SET_MM(0x21, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 786.406997][T19883] loop3: detected capacity change from 0 to 12 [ 786.522316][T19883] loop3: detected capacity change from 0 to 12 02:39:23 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "4eb915328f83cb302aba478e56916f0546002315d24f6f8f59c9cd878a3257c88e80ccb358f895ae0150fc6a1bb2ef425e6cb65f78ed275f87172cb87fcdbf37"}, 0x48, 0xfffffffffffffffd) 02:39:23 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0), 0x80800, 0x0) 02:39:23 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x181001, 0x0) 02:39:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 02:39:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 02:39:24 executing program 3: bpf$MAP_CREATE(0x1a, 0x0, 0x0) 02:39:24 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'sit0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000200)=@framed={{}, [@initr0]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x93, &(0x7f0000000780)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000840), 0x10}, 0xa4) 02:39:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:24 executing program 4: io_setup(0x1000, &(0x7f0000000080)) 02:39:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fdfbe280728b5af236af00d596117846fe87d76e565fbc85eac5f6ad5a3906ccd5ccab44fafe4e2c9cf858d0306af4a0a3d40ebabd060d7b3522ca5089eade22", "ee75b875199ddd1d5dffe231e34ed30148180eeaa7bb21ee6b58220b91d6e0c33cb161c9eba36f066a9c4b84f5c3541645d33c524405d88dd71af4fe92384e2b", "19569053d8493ea6322a882a822dc57ded6abc43423a39b052649cf5c0895a00"}) 02:39:24 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, 0x0) 02:39:25 executing program 2: bpf$BPF_TASK_FD_QUERY(0x1e, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 02:39:25 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, 0x0) 02:39:25 executing program 5: rt_sigaction(0x18, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000003c0)) 02:39:25 executing program 3: r0 = openat$bsg(0xffffff9c, &(0x7f0000002c80), 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x180000) 02:39:26 executing program 2: pselect6(0x0, 0x0, &(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)={0x0, 0x989680}, &(0x7f00000013c0)={&(0x7f0000001380)={[0x0, 0x8]}, 0x8}) 02:39:26 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}}, 0x0) 02:39:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)={0x12}, 0x40) 02:39:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:26 executing program 3: io_setup(0x9, &(0x7f0000004640)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0xfffffffffffffff8}]) 02:39:26 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) fork() clock_gettime(0x0, &(0x7f0000000080)) 02:39:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x14, &(0x7f0000000040)={0x7, 0x0}, 0x8) 02:39:27 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 02:39:27 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x10, 0x4, 0x4, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000340)=r0, 0x4) 02:39:27 executing program 2: set_mempolicy(0x4001, &(0x7f0000000000)=0x7, 0x1ff) 02:39:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@nat={'nat\x00', 0x1b, 0x5, 0x4a0, 0x0, 0x42c, 0xffffffff, 0x114, 0x114, 0x42c, 0x42c, 0xffffffff, 0x42c, 0x42c, 0x5, 0x0, {[{{@ipv6={@dev, @empty, [], [], 'bridge0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xc3, 0x114, 0x0, {}, [@common=@hl={{0x24}}, @common=@ipv6header={{0x24}}]}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private1, @ipv4=@private, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@local, @ipv6=@local}}}, {{@uncond, 0x0, 0xa4, 0xec}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@dev, @ipv4=@multicast2, @gre_key}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4fc) 02:39:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x5c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:28 executing program 3: clock_gettime(0x0, &(0x7f0000000080)={0x0}) timer_create(0x0, 0x0, &(0x7f0000001280)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {r0}}, 0x0) timer_delete(0x0) 02:39:28 executing program 2: io_setup(0x29ba, &(0x7f0000000000)) 02:39:28 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 02:39:28 executing program 4: ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) r0 = openat$kvm(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 02:39:29 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='}[{\x00', 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 02:39:29 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) io_uring_setup(0x3fca, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 02:39:30 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 02:39:30 executing program 3: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001740)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000017c0)=0x80, 0x81800) r0 = openat$bsg(0xffffff9c, &(0x7f0000002c80), 0x210700, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000002d00), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x40) recvmsg(0xffffffffffffffff, &(0x7f0000004c00)={&(0x7f0000004880)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0}, 0x2120) accept4(r1, 0x0, &(0x7f0000004d00), 0x80400) accept4(0xffffffffffffffff, &(0x7f0000004d80)=@nfc, &(0x7f0000004e00)=0x80, 0x180000) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 02:39:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:30 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 02:39:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f0000000240)) 02:39:30 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0xc000, 0x1) 02:39:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) 02:39:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000280)=@nat={'nat\x00', 0x1b, 0x5, 0x458, 0x0, 0x42c, 0xffffffff, 0x114, 0x114, 0x42c, 0x42c, 0xffffffff, 0x42c, 0x42c, 0x5, 0x0, {[{{@ipv6={@dev, @empty, [], [], 'bridge0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa4, 0xcc}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private1, @ipv4=@private, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@local, @ipv6=@local}}}, {{@uncond, 0x0, 0xa4, 0xec}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@dev, @ipv4=@multicast2, @gre_key}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4b4) 02:39:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000440)=ANY=[], 0x50}}, 0x0) 02:39:32 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000065c0)='ns/cgroup\x00') [ 795.679732][ T34] audit: type=1326 audit(1620700772.018:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20036 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7ff4549 code=0x20000000 02:39:32 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 02:39:32 executing program 3: r0 = openat$udambuf(0xffffff9c, &(0x7f0000000000), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 02:39:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) 02:39:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:33 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) recvmmsg(r0, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 02:39:33 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 02:39:33 executing program 2: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000840)=[{&(0x7f00000006c0)="d3", 0x1, 0x80000001}], 0x0, 0x0) 02:39:34 executing program 5: getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 02:39:34 executing program 4: set_mempolicy(0x1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 02:39:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 798.092226][T20069] loop2: detected capacity change from 0 to 264192 02:39:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18400000ff"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 798.229782][T20069] loop2: detected capacity change from 0 to 264192 02:39:34 executing program 5: syz_mount_image$romfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000840)=[{0x0}, {0x0, 0x0, 0x80000000}], 0xa08000, &(0x7f0000000c80)=ANY=[@ANYBLOB]) 02:39:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x16, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 02:39:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) sendmsg(r0, &(0x7f0000000900)={&(0x7f0000000940)=@un=@abs, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000004cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x140, 0x0) [ 799.087309][T20088] loop5: detected capacity change from 0 to 264192 02:39:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x4, 0x0, 0x0) 02:39:35 executing program 3: pselect6(0x40, &(0x7f00000002c0)={0x4}, &(0x7f0000000300)={0x7}, 0x0, &(0x7f0000000380), 0x0) [ 799.349153][T20088] loop5: detected capacity change from 0 to 264192 [ 799.558472][T20102] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 02:39:36 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5400000032000100000000000000000000000000400001003c000100090001006761637400000018040002800c0003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) ptrace(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000)='i', 0x10a80, 0x800, 0x0, 0x4b6ae4f95a5de35b) 02:39:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x2a, 0x0, 0x0) 02:39:36 executing program 2: bpf$MAP_CREATE(0x1c, &(0x7f0000000900), 0x40) 02:39:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 800.155450][T20109] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. [ 800.165260][T20109] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 800.173784][T20109] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 02:39:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x90208402, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:36 executing program 3: syz_mount_image$romfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1000, &(0x7f0000000480)) 02:39:37 executing program 4: syz_emit_ethernet(0x82, &(0x7f00000003c0)={@dev, @remote, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "2ea1f2", 0x4c, 0x2f, 0x0, @private2, @private0, {[@dstopts={0x3a}]}}}}}, 0x0) 02:39:37 executing program 5: bpf$BPF_TASK_FD_QUERY(0x23, 0x0, 0x0) 02:39:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:37 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x24, 0x0, &(0x7f0000004b40)) 02:39:38 executing program 3: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000400), 0x8) 02:39:38 executing program 5: socketpair(0x11, 0x0, 0x0, &(0x7f00000000c0)) 02:39:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:39:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:38 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 02:39:38 executing program 5: openat$autofs(0xffffff9c, &(0x7f0000000480), 0x0, 0x0) set_mempolicy(0x0, &(0x7f0000000040), 0x7fff) 02:39:39 executing program 2: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x141000) 02:39:39 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x141080) 02:39:39 executing program 3: syz_mount_image$romfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1058079, &(0x7f0000000400)) 02:39:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @remote}, 0xc) 02:39:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) sendmsg(r0, &(0x7f0000000900)={&(0x7f0000000940)=@un=@abs, 0x80, 0x0}, 0xa00) 02:39:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x80402002, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xa501fcf5, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x114031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @dev={0xac, 0x14, 0x14, 0x34}}, 0x8) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 02:39:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$inet(r0, &(0x7f0000004440)=[{{&(0x7f0000000000), 0x10, 0x0, 0x0, &(0x7f0000003300)=ANY=[@ANYBLOB="0d000000000000000100000013000000180000000000000008000000", @ANYRES32, @ANYBLOB="7f000001ac1414aa1000000000000000020000003ec80000100000000000000001000000ffff00000d0000000000000001000000050000005c"], 0xb4}}], 0x1, 0x0) 02:39:40 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1c00) 02:39:40 executing program 3: timer_create(0x0, &(0x7f0000001240)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000001280)) timer_gettime(0x0, &(0x7f0000000000)) 02:39:41 executing program 5: r0 = getpgrp(0x0) sched_getaffinity(r0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x80) 02:39:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000009c0)=[{0x200}]}) 02:39:41 executing program 2: openat$tun(0xffffff9c, &(0x7f0000000100), 0x202, 0x0) 02:39:42 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x30, 0x0, 0x0) 02:39:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xaf0b9cfd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:42 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 02:39:42 executing program 4: r0 = eventfd(0x300) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffff9, 0x8) 02:39:42 executing program 2: syslog(0x2, &(0x7f00000000c0)=""/74, 0x4a) 02:39:42 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @private}, @vsock, @ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x4, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000000)='macvlan1\x00'}) 02:39:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0) 02:39:44 executing program 3: io_uring_setup(0x5851, &(0x7f0000000080)={0x0, 0x0, 0x20}) 02:39:44 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) 02:39:44 executing program 2: socketpair(0x0, 0xb, 0x0, &(0x7f00000000c0)) 02:39:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb9000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:44 executing program 5: perf_event_open(&(0x7f0000001240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:39:44 executing program 3: r0 = openat$full(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) timerfd_gettime(r0, 0x0) 02:39:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x9, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd0, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6, 0x16, 0x22}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0xffffffffffffffe4}, {0x6}, {0x5}}]}, 0xd0}}, 0x0) 02:39:45 executing program 5: syz_open_dev$sg(&(0x7f0000000200), 0x1, 0x51d802) [ 809.581157][T20245] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 02:39:46 executing program 3: r0 = fork() timer_create(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x4, @tid=r0}, 0x0) [ 809.694888][T20249] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 02:39:46 executing program 5: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000440)='J', 0x1, 0xfffffffffffffffd) 02:39:46 executing program 4: bpf$BPF_TASK_FD_QUERY(0x1d, 0x0, 0x0) 02:39:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xa501fcf5, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:46 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) 02:39:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={&(0x7f0000001840)=@newtfilter={0x3c, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4}}, @TCA_CHAIN={0x8}]}, 0x3c}}, 0x0) 02:39:47 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000001c00), 0x0, 0x46440) io_setup(0x9, &(0x7f0000004640)=0x0) io_submit(r1, 0x1, &(0x7f0000005f40)=[&(0x7f00000047c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 02:39:47 executing program 4: io_setup(0x1000, &(0x7f0000000080)=0x0) io_pgetevents(r0, 0x120, 0x0, 0x0, &(0x7f0000000140), 0x0) 02:39:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x28, 0x0, 0x0) 02:39:48 executing program 5: openat$autofs(0xffffff9c, 0x0, 0x416001, 0x0) 02:39:48 executing program 4: getgroups(0x1, &(0x7f0000000180)=[0xee00]) 02:39:48 executing program 3: bpf$MAP_CREATE(0x4, &(0x7f0000000900), 0x40) 02:39:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xaf0b9cfd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="09000000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf5fc01a5, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) 02:39:49 executing program 3: bpf$BPF_TASK_FD_QUERY(0xc, 0x0, 0x0) 02:39:49 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat$bsg(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 02:39:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x19, 0x5, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x16, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:39:50 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:39:50 executing program 4: bpf$BPF_TASK_FD_QUERY(0x2, 0x0, 0xa5) 02:39:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xb9000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:51 executing program 3: bpf$BPF_TASK_FD_QUERY(0x2, 0x0, 0x10) 02:39:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001180)=ANY=[@ANYBLOB], 0x106c}}, 0x0) 02:39:51 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000000c0)=[0x0]) 02:39:51 executing program 5: openat$kvm(0xffffff9c, &(0x7f0000000080), 0x44000, 0x0) 02:39:52 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x600]}, 0x8}) 02:39:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x9, 0x1, &(0x7f00000002c0)=@raw=[@call], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:52 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x6}, {0x1, 0x0, 0x0, 0x7}, {0x6}]}) 02:39:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:52 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0xc, 0x0, 0x0) 02:39:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf9fdffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 816.289702][ T34] audit: type=1326 audit(1620700792.629:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20339 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 02:39:52 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[], 0x3c}}, 0x0) 02:39:52 executing program 3: statx(0xffffffffffffffff, &(0x7f0000003340)='./file1\x00', 0x0, 0x0, 0x0) [ 816.763190][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 816.769855][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 02:39:53 executing program 5: set_mempolicy(0x455571a2289565ff, 0x0, 0x0) [ 817.087115][ T34] audit: type=1326 audit(1620700793.429:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20339 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 02:39:53 executing program 2: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000840)=[{&(0x7f0000000380)='\x00', 0x1}, {&(0x7f00000006c0)="d3", 0x1, 0x80000001}], 0x0, 0x0) 02:39:53 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x2b, 0x0, 0x0) 02:39:53 executing program 3: io_uring_setup(0x3e8, &(0x7f0000000000)={0x0, 0x0, 0x2}) 02:39:54 executing program 5: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={&(0x7f0000000040)={0x2a0, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x9c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbc596cf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x760f20a8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd200}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x548186d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf515}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4183b53a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8d20}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9be9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44c6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x25df}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x15ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3412262b}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x320b}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7732eb4b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3576}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb813}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ef0f019}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x69158009}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59bd2cc8}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x60, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xaf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x96}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x79}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1de160c4}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5d9286d2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a67187c}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x6c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x94ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d9d53a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5830e3b3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bd4a298}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5424efb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8534}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f5e8674}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x294bda50}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf642}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6d9c}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2353e13b}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x9c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x406d3b37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xb4ef1f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23a44739}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x86}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x748ed9a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4614126b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x71}]}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x4000814}, 0x4011) syz_mount_image$iso9660(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x7, 0x7, &(0x7f0000001980)=[{&(0x7f0000000540), 0x0, 0x80}, {0x0, 0x0, 0xfff}, {&(0x7f0000000740)="1fcabab6927572794f23d6f2725cabeadda5621b4b4365fd8d934f746e36c64c5b7ea056b336fdeea81aa3db824444f2ef069e5809e3985cec27fbf35fd4de3dba9d6954e2eaed49a859bab6c7ed7ce6e0d55e4a8aaaca41ed210e857d80828d26783aea401c286e7dba7df57bae839b42f60120a32dad53dc5dbf1c944a0fb34fbdd827a060f4b1", 0x88, 0x6}, {&(0x7f0000000800), 0x0, 0x2}, {&(0x7f0000000840)="092372d50f4f40646897b0543b474b2cd9a7409e414c3267e361794ceac283be96c64d5bdf36ed0e9be07067d32aac93da54e69224be40ee3c5e11bd97308d2f7b5e9233351303d507597097afff9123b131fe4aad283c0af39cfabfd01b9601410530d96adbadcacb27b6ba99446c904303d8d060ce3523b832827407e4ac03fa84d0c98416ac8680e29d781526a5842792f9200d5b1c122405e12a5a4b96b463a8dbcadd4a8abdce18b6e9ee68763e45050c31d9c23671be265dfa4a9ff6f767e6cded4795e1c395e0b40c63dea063e087e234d34b0c14a1644d45", 0xdc, 0x5}, {&(0x7f0000000940)="abc0e000a9cab12f4209bcc3b7e7aa155fb508405b6f86aff7a52a80e7709b7dfbb26bc6529b4c51a6a8ac", 0x2b, 0xa7e}, {&(0x7f0000000980)="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", 0xbf0, 0x7fffffff}], 0x81804, &(0x7f0000001a00)={[{@map_normal}, {@map_off}, {@session={'session', 0x3d, 0x4d}}, {@map_normal}, {@block={'block', 0x3d, 0xa00}}, {@utf8}, {@unhide}, {@cruft}], [{@uid_gt={'uid>', 0xee00}}, {@subj_type={'subj_type', 0x3d, '(#^:'}}]}) r0 = openat$kvm(0xffffff9c, &(0x7f0000001c00), 0x6000, 0x0) io_cancel(0x0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x4, r0, &(0x7f0000001c40)="ccdf2fdd4e4b7ee88d94ba121beaaf17ecea91e9b46e0bfc7e49e281e5b20b12da555d39b22146dc94bb03ec2c49d57d4333dded41ab38b9e451841fe61f5f399609b616bc96baf28a1eb060ef552216b73f77dc3d2d668e22fa08bebd0d69a18d4495b5b84259e78046fe2ebdd68074d07c6a1a6e49b3e6920a83ff543c86ca988821286cf8", 0x86, 0x10001, 0x0, 0x1}, &(0x7f0000001d40)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001dc0)={0x3ff}, 0x8) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000007, 0x2010, 0xffffffffffffffff, 0x1) io_uring_setup(0x374d, &(0x7f0000003500)={0x0, 0x7f39, 0x8, 0x0, 0x24a}) syz_mount_image$iso9660(&(0x7f0000003580), &(0x7f00000035c0)='./file0\x00', 0x9, 0x0, &(0x7f0000003600), 0x2128060, &(0x7f0000003640)={[{@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@block={'block', 0x3d, 0x800}}, {@gid}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@map_off}], [{@euid_lt}]}) socketpair(0x15, 0x800, 0x401, &(0x7f0000003700)) [ 817.827895][T20363] loop2: detected capacity change from 0 to 264192 02:39:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc50b0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 817.969427][T20373] loop5: detected capacity change from 0 to 264192 [ 818.008500][T20363] loop2: detected capacity change from 0 to 264192 02:39:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfbffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:54 executing program 2: syz_mount_image$romfs(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xe80cd9660178e872, &(0x7f0000000a40)) 02:39:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 02:39:54 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000000000)={@multicast1, @remote}, 0xc) [ 818.272602][T20373] loop5: detected capacity change from 0 to 264192 02:39:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000300)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x50}}, 0x0) 02:39:55 executing program 2: r0 = syz_io_uring_setup(0x3dc4, &(0x7f00000002c0), &(0x7f0000033000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000007c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x23456}, 0x13ab4ace) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xbf, 0x0, 0x0, 0x0, 0x0) 02:39:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, 0x0) 02:39:55 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x8, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:39:56 executing program 5: bpf$BPF_TASK_FD_QUERY(0x19, 0x0, 0x0) 02:39:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc60b0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x7fffffff}, 0x40) 02:39:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfd9c0baf, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:56 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 02:39:56 executing program 5: timer_create(0x0, 0x0, &(0x7f0000001280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, &(0x7f0000000100)) 02:39:56 executing program 3: bpf$MAP_CREATE(0x16, &(0x7f0000000900), 0x40) 02:39:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) recvfrom(r0, 0x0, 0x0, 0x21, 0x0, 0x0) 02:39:57 executing program 5: openat$autofs(0xffffff9c, &(0x7f0000000040), 0x111000, 0x0) 02:39:58 executing program 4: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xffff7e00) 02:39:58 executing program 3: getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) 02:39:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xc70b0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:39:58 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000900), 0x40) 02:39:58 executing program 5: r0 = fork() bpf$BPF_TASK_FD_QUERY(0x4, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 02:39:58 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002040)='ns/user\x00') 02:39:59 executing program 4: r0 = openat$tun(0xffffff9c, &(0x7f0000001640), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001680)={'vlan1\x00'}) 02:39:59 executing program 2: bpf$BPF_TASK_FD_QUERY(0x13, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 02:39:59 executing program 3: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000000440)={"c3ecb912368847d4456f651c956f5c3e", 0x0, 0x0, {0x0, 0xe17f}, {0x0, 0x7ff}, 0x0, [0x0, 0xca03, 0x9c5e]}) lstat(0x0, 0x0) getpriority(0x0, 0x0) lremovexattr(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "a8f94efa94e91f78e4023d53c149c73bcf3be25c9156740c718ab86880b5be2c90aa839fde7c4adbe0ffc15f84548554b4d668b27de533867d81bf175b749109", "3095484f5251bc7a22a0c80e258f375c3d78f33f26060dbbaef1f4ada830318d"}) 02:39:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x11, &(0x7f00000003c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:39:59 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000480), 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) 02:40:00 executing program 5: sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000814}, 0x0) syz_mount_image$iso9660(&(0x7f00000004c0), 0x0, 0x0, 0x4, &(0x7f0000001980)=[{0x0, 0x0, 0x80}, {0x0}, {0x0}, {0x0, 0x0, 0x7fffffff}], 0x81804, &(0x7f0000001a00)={[{@dmode}, {@map_off}, {@map_normal}, {@block={'block', 0x3d, 0xa00}}, {@utf8}], [{@uid_gt={'uid>', 0xee00}}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, '(#^:'}}]}) r0 = openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x4, r0, &(0x7f0000001c40), 0x0, 0x10001}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001dc0)={0x3ff}, 0x8) io_uring_setup(0x0, &(0x7f0000003500)={0x0, 0x7f39, 0x8, 0x0, 0x24a}) syz_mount_image$iso9660(&(0x7f0000003580), &(0x7f00000035c0)='./file0\x00', 0x9, 0x0, &(0x7f0000003600), 0x2128060, &(0x7f0000003640)={[{@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@gid}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}]}) socketpair(0x0, 0x0, 0x401, &(0x7f0000003700)) 02:40:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf5fc01a5, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$romfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:40:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000240)) [ 824.456008][T20484] loop5: detected capacity change from 0 to 264192 02:40:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 824.925030][T20484] loop5: detected capacity change from 0 to 264192 02:40:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)={0x1b}, 0x40) 02:40:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)={0x17}, 0x40) 02:40:01 executing program 3: pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300)={0x7}, 0x0, 0x0, 0x0) 02:40:02 executing program 2: syz_open_dev$sg(&(0x7f0000000000), 0x7f4d, 0x2002) 02:40:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:02 executing program 4: openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) 02:40:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:02 executing program 5: openat$kvm(0xffffff9c, &(0x7f0000000100), 0x18082, 0x0) 02:40:02 executing program 3: syz_mount_image$romfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000840)=[{0x0}], 0xa08000, &(0x7f0000000c80)=ANY=[]) 02:40:02 executing program 2: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 02:40:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xb, &(0x7f00000003c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x0}, 0x8) 02:40:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x19, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:03 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 02:40:03 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {'port', 0x3d, 0x8cffffff}}) 02:40:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf9fdffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:04 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x5, 0x0, 0x0) 02:40:04 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) inotify_rm_watch(r0, 0x0) [ 828.214347][T20558] 9pnet: p9_fd_create_tcp (20558): problem connecting socket to 127.0.0.1 [ 828.265131][T20560] 9pnet: p9_fd_create_tcp (20560): problem connecting socket to 127.0.0.1 02:40:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f00000003c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan3\x00'}) 02:40:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18208500ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:05 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x5, 0x0, 0x0) 02:40:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000017c0)={0x1b, 0x0, 0x0, 0xb}, 0x40) 02:40:05 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) 02:40:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfbffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:06 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="8520"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:06 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x5, 0x0, 0x0) 02:40:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x0) 02:40:06 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000480), 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 02:40:06 executing program 4: io_uring_setup(0x7555, &(0x7f0000000240)) 02:40:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x5, 0x0, 0x0) 02:40:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x200, 0x141080) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) syz_open_dev$loop(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000100), 0xb0d7, 0x0) 02:40:07 executing program 2: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x8}) 02:40:07 executing program 4: syz_mount_image$iso9660(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)) 02:40:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfd9c0baf, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:08 executing program 5: openat$autofs(0xffffff9c, 0x0, 0x402000, 0x0) 02:40:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffbffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:08 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000001c00), 0x0, 0x0) fstat(r0, &(0x7f00000042c0)) 02:40:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="183c0000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:08 executing program 4: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8684d0, &(0x7f0000000240)) 02:40:08 executing program 5: r0 = openat$full(0xffffff9c, &(0x7f0000000c00), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000bc0), r0) 02:40:09 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000003c0)={0x400}, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, 0x0) 02:40:09 executing program 2: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x10001, &(0x7f0000000280)) 02:40:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:09 executing program 4: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000080)={{}, {0x0, r0/1000+60000}}, 0x0) 02:40:09 executing program 5: openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x109840, 0x0) 02:40:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffe000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 833.917488][T20641] VFS: Can't find a romfs filesystem on dev loop2. [ 833.917488][T20641] 02:40:10 executing program 3: io_setup(0x9, &(0x7f0000004640)=0x0) io_submit(r0, 0x400001f1, &(0x7f0000005f40)=[&(0x7f00000047c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0, 0x0, 0x0, 0x0]) [ 834.092704][T20641] VFS: Can't find a romfs filesystem on dev loop2. [ 834.092704][T20641] 02:40:10 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0xd5, 0x101) 02:40:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x12, 0x0, &(0x7f0000001340)) 02:40:10 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:40:11 executing program 3: r0 = openat$vcs(0xffffff9c, &(0x7f0000000140), 0xc2083, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:40:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 02:40:11 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) 02:40:11 executing program 5: io_setup(0x2, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x8, 0x8, &(0x7f0000001140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000001340)={0x0}) 02:40:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:12 executing program 3: r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, r1+60000000}}, 0x0) 02:40:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffbff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:12 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 02:40:12 executing program 4: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xaa, 0x6, &(0x7f0000001300)=[{&(0x7f0000000080)="32f55b52c86fbf5764a5a114803fb0a4e49c93caf89dbe8a8c5bf0cfb67ad71d6e50f5dffc30ff89836f01e7506d941b352a8ada6c964fe7908225907808f37ad16d91ac099e6fd477769f45c27599c2196b32fd94aa52a4aba9a6254bb3c209ce262270f887f9b1774ad734f1e2c8e93a54aed328b0366ec5e8038d5894c4421accbd98", 0x84, 0x1}, {&(0x7f0000000140)="f6684559deb66f5532fecb1525e86113a14b3d4e1bc6fbab8825f74b303b8e3ae78152c20f6e31a9f60e337228e1c52dc2a38507667ba72ecf025177757610371f8cb31bb734d01bf8546caeff702e43d175e102c35a6611e62bf4ba", 0x5c, 0x8}, {&(0x7f00000001c0)="42a7f37eba1b00fa67e47edb53a8072bcfdcdd71245d0a8726182043e40846a187ca9f82d7", 0x25, 0x1}, {&(0x7f0000000200)="57865e7642c958921d604bdf9853143e276f1195679575261d1caefb7f76a2241e1118912a5f36a7fe9822f9236194022d038d0979aa20dfc4092b7e3756d4e6503c99cafad8bacfdcc1de72aa3c7823c8", 0x51, 0x2}, {&(0x7f00000002c0)="7bcbb3f92418967a39960f036e77b98d22bf601dc9602af77d21d39cad0ddc6996886ca02d96f6", 0x27, 0x9}, {&(0x7f0000000300)="79a17892933193aa9c25923ff0ef7b18941ac207032a968b01dfa2dd8a7f9d1f6258977b38fdfc3a1a5d7c582538789d636c63fbd4c63213da551c20cca9ed4c34cf5da84af74cbc59981b4632662e9a8ad078e58b6e52e31c44399f51c9350efbc972f735e183b0bd84d2e47e6427e7fa16bfc03a2a08bbc5d6cda1aa2de62f0244aa49572e5a3bbe9db341fbd87a131680ff9449ab93e86c3369fe3b8d272053e2a5aaea2f70faf4a80d6cd5a28a627cc038512d7ec2812c61573e2ad508207386ebd9f17a702ee6620659f36240fe08f08f0d7fa03b375b52e3dfc3e13dc2a64a8d466fca0ee311079a41c36bf9d7bc136bd92eb550c82c401d6582e73ef94b2b845d831728538d424f0d0970cb54423bb1e7c43c28a1de0f4d74041eb11e9e9b803dae31fa98dd795518eec19e2ad37e0fcb4b53f651a6c85dec86680aee7f652fbd62e6ac5d0794db13827c4aff7e7777502705134db7c07d9a22850f35c55aad5657afcb5d6a425c59e236d17baf839311790c0df268f8d08411205d6192e2d2bfeeab6d455d1c5c2c17edf73ec220a5f628f0826e79e60dc5d7636def39349dad8fc822360c8b45829065ec5ec8527ac7a40e9105fd21ac9b764f4cab4241ca63cf65d596677d9ef00824aec2f05048c94b9bb7e952af55ea58350b3050939bcaccf096ce5b9718d745c9c9ed6abc8a6b12be1510cb32297ac257c1989f15b9f0ea3897dbea78882a8468061610fb6cc95fed1687cc8da1ed0bedacfe4b5ad16c98b619c3c91d0d956ba5ad92461a673337d34a9112170f641c5c3858b7f63d6fe914b3214823ea31893475e65716ee9c5d8f7ca37cda0f11f7546dc4a0f70a0a82bab0b0724aff6d899d9da34f8761b081ed3bcd3c0d20e7d9805634d346fecb0f76472850e450f5bd8abdc0cdf5dea68520be489b793d28d605392b0e1fc9f0ee74acdb06942d3f2c06fef7c0b219281ce1ac3f7b462a964cc673e8283a49b0a828bf4e8acf062b009d3647c10202058dd7209a6d351f481eee54b1079b99a0f8a6d6768605f151c3d24822b05027e57660d80202c59653656de91dcf0f67759b83b909b9d99eff1d4cba3e59d766e66facbac43d42b6b2ff8d89799dfcd55d43d01cfdead2e694504cecb4efdb67500cd3ed7515acfdd077a86853ddd460d7fe45b75c99ad58d3cf1633f56c22cf6c253adcdf6165896c19c72dc012dc7372b385e309e5cbe71981c2a9afff51decf47aa5b8ec0c0be048c3bbc3b3fd0c510e27c86184691250ea878aa2ab2e312491e05c7edf1aed1d75dc7783c26fdb3408c327ec6dc768dbfa52004b8a38570f0f502c1649b842f4fc53b3cc3526d0970d8e73e1681d89f0dcd1d41236cbc4cc3bdb61a27475a54174b5dfec82a93c1f1b1fb1c7eb7c9623735152d16d1ac91c2907a144f5c93cbc9b530c282564dfeb6ad9997e58d474726b952cbb16f49d70b832c88b62a6674144e6af7fd7f243a354b44432142dc32bed6ae507ac9e5c621f9fbb96eac3fbd3fc95c7c3d478aa53440a2a2490c2d8442994196d20f683f73951356838ec3281a2b91aed30a2513b9a5bd15c758e98f0dd51fde3ebc7fa5d35fca0daf9787b9f3072dc1f50ad1be7685616e25abcd5629aa39ce0255a603fce32d0d982f56f6426be1d06220ef52fc5ed2260f11dbdf5b0cd3aed052149911d008d6fba0ec87841413e4a5afad90f2aba5b234ae9bf2b9ed62df8b4bb31e8a5d13b57b23a2bf798d235115696a875b3904df6b0c984f12a2091eccbe083947117043b7f7f5f2383c6f413b369a9c7f363d551be489d3f7cfb328833570761a985ad8122bb8dd94ec2d3af3ecb8fa8033437b1386309174b285b1b8ff8229c80d6cdfb057612551ad2a5f57156385bec7cf7140749e918011127f2c8d6f6f1c9419a5a40ea381eaaf835e65e176dddaf64f1c0f5d2cc24566e6cf08aa710c82665f8153090e9b8f9b5e987b3a92dde9a37bc7f7817e1b0a3ff3e2b0d07222ca4973d683d1a99dced2128dabd6b67d02429a89a6468729c6589ed73d85f05c78363bb288749a48f8233a94c1acc6874d96b312bcc788060847bec2e4f78d7dd89d063372f56c9f7ef4a99e1e5b11c30106e42cfb0d49b068f1374d04f97cb4a66100f2d019dd6fadda1b4644c97149c67a9036202d84b598584127e4c1a68b9181f8a1f19f14d998320b777af03ee04f02d7705aeacbc5aab12e50a7af387bb7374e6ac26ddb48ddd2b14ddc4cc173dbc329ea967ab9985b66db403103a6251538dc1fcdd43f6746b1d495d67a8b261db52bfe32eb56ca3b3c7b35cdafb98261067f054775d14110b05ee34f2ce5a658c6a981c42f3ccd723debd8626100b3d6e45dea74373fbde466bb302a3b76a6636cecbde3b156ec371068e49d14152a1315981e17696ea255570771e16298aa01354c020a7204a81d17017851405299e717a462aa43807b0d3609b4cdb6b50303390b2bdf404c964ab8c3acf4c55f0ea72e147c5b52038c1b49c19a6ef44b781379881004acf8387c8088eb995963821acf508bd70db509caab3de6d79252993636342d4f8c91cdc6fb1297c32e0fc93e63b75294fcaa4453ce0344ba123793b5bb16b9765abdedebe6f07d0ce58608854b07e1e28c6cf2d5cba81777cca0265c538ef70457a83637fad957ca46f0a5be778e3d2aebc9eab668776f2186a939b5a482928c780746f4956217e3d256adb4c4a559d826558d7b9c9d42edc5e6bf7ba6559e5e12c8bfcff7e6e8bd99ab933a7c1191cc8633419bba6ecdc614f1f0216232a87b442cb4093b270f1c536f1b1060b79f0c190e94437bb07db3e31d3b3c62de9be4285e8bba0018ba853fd87f4d76108ffd88dd1a685c456e82ab42615042b7bbc3e27bcae4ba20fe1f5e50c3ae4e2c10859ef4f15bb61549985fe0b019cee20c526013bd51896e22dd640f2a363d6aa722bc2c10c26f9a30f3d4f210d0228fb360dead12358a1b083d36c6def4b6aee7d354ca6ac7072d34477e2e4c821582270f6741054b16f38cd81d5732a854f47f971830406943725448092740a895e8e828f5b1749ce5b91e1f59026170030f450068c1e419a5e33e63a5453171ddaf3cd492bfb0f456ddcf4694eafcf757c623739d7a0f70a38cbc6249bfc849657b447c22506f7e17ef3c7d7f9652f7a0687a1d4c863d64671f763c01f9c7e2b9e17bcf48e680d22e5413deb497f3209a4d52d323e543f2763143f5fce53bec3934f3405474142ad141e38298d55677e960cf243284d122ec2c0261b70951f9fa513683894712095c2e668aeaf8c7c8be308c50d3db21f45b3d3bd993671364426949e76e5377c8851c8ff553e29a3fe49fea05646ac85bf72489fc89aeda577cc6b294cb8c46eb50f2c68eaa01481cd3a15935c4710cb088fcca1f2bb78e69dd82440c29e6f63c7bda358357d266a35fe87de5d2390442a02a733057edb71d86bd859fbd55accb0923f023e9aecb7c78bf91c94084947b9c6e559ce6ba464f864fca7a1bd3b2094afb570253ef7e40d7a3a530460d07d8f58611c327b84cf77933f5f225937ad3c67e034892afad8c8813baa224d5621d707142d9c473129a7539ab659be3b53bd85eefdca0901fb8feca007a749610cf999f07f77488f7b9aa91db1351e68e0c49fc4855d0d319b1b09a5e50911e8b8db9dae24aa726352aa75a15b4ae5e96220d15c37ab113b58974d167d1c589bbd30ef49e3a38b533dcf6a062cd812e4f837cf544e84c4d5d29848d4b5188bde8fd009a8b266e5b1b16fedff4b94882c3951fabda2e2f55edcbd384a5013939a866d6acce0a7568a2883213495b92e56f8f5ea868aaf735e26dcb6e90d96a271db4f93e6a6e523631e1fea0cef90b46cfab6e294772f319639b4306e6e3aa5c3cf57b9e43602a93971429c0cc9be1baaaed9114a56bc588284f06be335db40aac1fb605e2a88ec3208b3bc4e74c61d5cab9fb3fb7d6c3c06b696098ac48dfab5358c894c0389c69d98533434723cbe31427bfd61c868dc77f982224af28998e4bf52cc0384a4f98b5d3932b6aa63611f0bae2ccb896e19b46d077fa2d399af2510c53500bbf5fedffeebe6812bc46dab48d14f17737108f2c1c3dc5c5955252503baf7e57fcf19e46587bba10d5999ac6452b6724761e3523d9478a30c79569761ed35a846e9642b92f351c6c1454b0022d8265a121ed0fa887281d18adc55b4166b3e8a4f159d28d5f347e025c66b1136ea7bfcc156f9b53048257d5926a17f758a7384972298282401e88120fc9a198b7d0b1219b339037f7fca6a69fd5e5fd4b180545fd587da5af0d8c5ef1b361d5b643a728cc56593f984acd8e28d1f650662750db9e910a0ff1b92b13c71c91b49e541f9714281aaab129d9738d31d3bb09add099433fd9bef9cb1717d4bc146112742f09caf9fd243de74dcd8e7c992f602b24a57c0af335bc09225fc91c4f2e296b422dab507fa5feb9bee2865256a94d2c1be9ebc00748d7ad19d9167be05f9a37f8d428cf0b4ff6f3d90ba1f324287f1f0eb1cc9c5460cb335d3fdf262c8c833496d436814bcc2d009cee319e1084102121a0dad720ec9e278beb99dc15dfbd5cf8d0f13fb6fb11ec7fd08b194eae130832e53a718ab251e476111d142dac1604826778c7174d55c4c3894c4972076f639fbb9704d5196a0a4601398444745cf480af3d323beb701d9d65c919d115cef4ad157b02873b3d3818c6996fa1a1bf906ec3cfb7f4a653f89f0fbd235887303d9780c2a7bf2fd372f5755448dbc14d1e533c5ecb6829c5b7ff75cbde6934181856d8978d19896002cf9a2f6346522b9fe3fb693d755d9654b56b3f7470a7f6be2b7bca152904d94101e2ae6a667d682448a276b340a06afc5c4173a4c7d68c5a6f4323c084dee3225d8042b3e3de0b4cd7a59268e324d7c56197d9d17739dfd43f563423803a8a961258340c529d99029859b069043d2964ec203eec2d508f3cb3f4c18f850f77ccfd556926df93da7a2da804709564fadc143ea7878a4c7f7189f0fdbb8147837231d8ddfd4b9f8ad505c0a8a7ac5d418722f3c795c5aa28449972090fc09a1fee20facc7a2c3fbc8ec1c38516558cbd950eab31b166f948f7d9e1ec513934c5db0aafd95fbc1057e25e33b352deb62c7918944a3a4627d952635094dc7017375116f0282cb41f77bf41222ef1ccb2d32e90f86b25b4ad7a7b7b818c744c6716c2677c87d1290efb15563fa3e4bfdb2db3b48f138225702b39bd8ce15071396b821331fe8705da4abb633a3d21e5c1c631f0ecfcdbe3430a30f253af859e9f2efa252ab32800a1a42201eba6b3c97ef4497899aa8bb5a0c9b4eb8419b8b1dbea423e029c1f4cc7888710dbc3cddf7c0250d79f488d4f5fb2e82bfa4559d16098571bf365d4140e801645bf714988ae481f616376ee815cc1ab75e097c9934b85cd73bcd0dc74830620148ab1c00bd2869fbfab141b283f47ee74fb3410c9a77034a72cbf5f5e7dfdcb5f52a9049f8ff8896557f84b662b74f69ef637896b48c1727b52198eafa21b5902a083d0c7e135d4b7df09f942831425d4bc25b62c0aebecf52a670cc6733de93e4b39801ba05fb5d125a0e059594c939618e76313924d232809d7ef43728e7f751c57497a37f16bf7df0f67bb1ef2a193fbc756aa45c495cb1f4f432d0ee3ed2b5c9025e234f4e365659e24d0f65fd09ecb00d0b8a3c0f52b270311091ec41257623759581cd74784b1a764f5d822f8cb", 0xffe}], 0x10, &(0x7f0000001380)={[{'][\xfa-&/*'}, {']\''}, {}, {'\'{#+.&./,\x03\\-^{]^.{\\'}, {'\xf1&'}, {'\\e'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@appraise}, {@obj_role={'obj_role', 0x3d, '+\''}}, {@subj_role={'subj_role', 0x3d, ')\xd3'}}, {@measure}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) getsockname(0xffffffffffffffff, &(0x7f0000001400)=@un=@abs, &(0x7f0000001480)=0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x20, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001600), r0) 02:40:13 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) [ 836.948233][T20692] loop4: detected capacity change from 0 to 7 02:40:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffff000000080000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 837.094488][T20692] romfs: Unknown parameter '][ú-&/*' 02:40:13 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.size\x00') 02:40:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$inet(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000740)=[@ip_retopts={{0xc}}, @ip_retopts={{0x10, 0x0, 0x7, {[@lsrr={0x83, 0x3}]}}}], 0x1c}}], 0x1, 0x0) 02:40:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@nat={'nat\x00', 0x1b, 0x5, 0x4a0, 0x0, 0x42c, 0xffffffff, 0x114, 0x114, 0x42c, 0x42c, 0xffffffff, 0x42c, 0x42c, 0x5, 0x0, {[{{@ipv6={@dev, @empty, [], [], 'bridge0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xec, 0x114, 0x0, {}, [@common=@hl={{0x24}}, @common=@ipv6header={{0x24}}]}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xec, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@private1, @ipv4=@private, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@local, @ipv6=@local}}}, {{@uncond, 0x0, 0xa4, 0xec}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@dev, @ipv4=@multicast2, @gre_key}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x4fc) 02:40:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdf9, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:14 executing program 2: bpf$BPF_TASK_FD_QUERY(0x13, 0x0, 0x0) 02:40:14 executing program 5: openat$full(0xffffff9c, &(0x7f0000001480), 0x418102, 0x0) 02:40:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1600bd60, &(0x7f0000000040)={0x7, 0x0}, 0x8) 02:40:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd80, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:40:15 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) statfs(&(0x7f0000000140)='./file0/file0\x00', 0x0) 02:40:15 executing program 5: socket(0x2, 0x0, 0x1000) 02:40:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) 02:40:16 executing program 3: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @remote}, 0xb) 02:40:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff000000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:16 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_targets\x00') preadv(r0, &(0x7f00000017c0), 0x352, 0x0, 0x0) [ 839.863902][ T34] audit: type=1326 audit(1620700816.209:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20735 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 02:40:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:16 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @private}, 0xc) 02:40:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'wg1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vcs(0xffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) [ 840.654099][ T34] audit: type=1326 audit(1620700816.999:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=20735 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 02:40:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd78, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:40:17 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000880)={0x50, r0, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x50}}, 0x0) 02:40:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001000)={&(0x7f0000000f40), 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)=@bridge_getvlan={0x18}, 0x18}}, 0x0) 02:40:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:18 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f0000000880), 0x0, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) 02:40:18 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$romfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x1000, &(0x7f0000000480)) 02:40:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:18 executing program 5: openat$kvm(0xffffff9c, &(0x7f0000000200), 0x1, 0x0) 02:40:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'wg1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vcs(0xffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 02:40:19 executing program 4: syz_io_uring_setup(0x1996, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 02:40:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x141000) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000180)={0x3, 0x0, [{}, {}, {}]}) openat$kvm(0xffffff9c, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) 02:40:19 executing program 5: timer_create(0x0, &(0x7f0000001240)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001280)) 02:40:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:40:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffbffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x12, 0x0, 0x0) 02:40:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x18}, 0x40) 02:40:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'wg1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vcs(0xffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 02:40:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@dev, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) 02:40:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={&(0x7f0000001840)=@newtfilter={0x24, 0x2c, 0x1}, 0x24}}, 0x0) 02:40:21 executing program 2: openat$bsg(0xffffff9c, &(0x7f0000002c80), 0x210700, 0x0) 02:40:22 executing program 4: bpf$BPF_TASK_FD_QUERY(0x7, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 02:40:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffe000, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x21, 0x0, 0x0) 02:40:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18006100ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'wg1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$vcs(0xffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x3f00) 02:40:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x12, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 02:40:23 executing program 2: r0 = socket$inet(0x2, 0x3, 0x5) sendmsg(r0, &(0x7f0000000900)={&(0x7f0000000940)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x80, 0x0}, 0x0) 02:40:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x1c, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffff000000000000010000001800000009000000000000000600000095"], &(0x7f0000000240)='GPL\x00', 0x6, 0xab, &(0x7f0000000280)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 02:40:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd4(r0, &(0x7f0000000600)={[0x5]}, 0x8, 0x81000) mount$fuse(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x2000000, &(0x7f0000000bc0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_appraise}, {@permit_directio}, {@permit_directio}]}}) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000340)={{0x0, 0x0, 0x80}}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac941400080002007f0020010c00028005000100000000001c0010800800034000deff0008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800005, 0x12, r5, 0x0) preadv(r5, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r2, 0x0, r4, 0x0, 0x4ffe6, 0x0) 02:40:24 executing program 2: clock_gettime(0x0, &(0x7f0000000080)={0x0}) timer_create(0x0, 0x0, &(0x7f0000001280)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x77359400}, {r0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000005840)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000005880)) 02:40:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffbff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:24 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x600]}, 0x8}) 02:40:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:25 executing program 3: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[{&(0x7f0000000180)="ad", 0x1}, {&(0x7f0000000640)='>', 0x1, 0x80000000}, {&(0x7f0000000740)='9', 0x1, 0xffff}], 0x0, 0x0) 02:40:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd0, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0xffffffffffffffe4}, {0x6}, {0x5}}]}, 0xd0}}, 0x0) 02:40:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd74, 0x0, 0x0) [ 849.188595][T20869] loop3: detected capacity change from 0 to 264192 [ 849.270897][T20875] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 02:40:25 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$sock(r0, &(0x7f0000000a80)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x1, 0x0) [ 849.368194][T20878] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 849.451220][T20869] loop3: detected capacity change from 0 to 264192 02:40:26 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, 0x0) r0 = openat$kvm(0xffffff9c, &(0x7f0000000200), 0x1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 02:40:26 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) sendmmsg$inet(r0, &(0x7f0000006d80)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @private=0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x18}}], 0x1, 0x0) 02:40:26 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000480), 0x0, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 02:40:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdf9, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0), &(0x7f0000000040)=0x98) 02:40:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x25, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES32=0x0], &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000040)={r3}, 0x14) 02:40:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000180), &(0x7f0000000280)=0x8) 02:40:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffb, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:27 executing program 5: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000840)=[{&(0x7f0000000640)='>', 0x1, 0x80000000}], 0x0, 0x0) 02:40:27 executing program 4: bpf$BPF_TASK_FD_QUERY(0x8, 0x0, 0x0) [ 851.456505][T20920] loop5: detected capacity change from 0 to 264192 02:40:28 executing program 3: r0 = openat$nvram(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), 0x0, 0x7000000, 0x0) [ 851.637919][T20920] loop5: detected capacity change from 0 to 264192 02:40:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 02:40:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) 02:40:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0x2}, 0xc) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000100)='\\', 0x1}], 0x1}, 0x0) 02:40:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:28 executing program 3: r0 = socket(0x1c, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000100)='N', 0x1}], 0x1, &(0x7f0000000240)=[@dstaddrv4={0x10, 0x84, 0x9, @loopback}], 0x10}, 0x0) 02:40:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:29 executing program 2: r0 = socket(0x1c, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x1c}, 0x0) 02:40:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x24, &(0x7f0000000040)=0x206, 0xffac) 02:40:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x8}, @void}}}, 0x1c}}, 0x0) [ 853.422145][T20961] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 853.587675][T20966] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 02:40:30 executing program 3: syz_80211_join_ibss(&(0x7f0000000180)='wlan0\x00', 0x0, 0x0, 0x0) 02:40:30 executing program 2: r0 = socket(0x11, 0x3, 0x0) bind$nfc_llcp(r0, &(0x7f0000000280)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "7589a58befbf94c8102a6a5a94d9dd0c778f3c62ec1b196f4a42a2119fec8ebafc2de873a1cb5a7623e68ca5bde91319917924092b3686868613e66cbc0f57"}, 0x60) 02:40:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 02:40:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:30 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 02:40:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x3}, @void}}}, 0x1c}}, 0x0) 02:40:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f00000017c0)={[{@fat=@dos1xfloppy}]}) 02:40:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) 02:40:31 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000540)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 855.213547][T20987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 855.316602][T20990] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 855.398654][T20991] FAT-fs (loop3): bogus number of reserved sectors [ 855.405782][T20991] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 855.415445][T20991] FAT-fs (loop3): Can't find a valid FAT filesystem [ 855.515840][T20991] FAT-fs (loop3): bogus number of reserved sectors [ 855.523000][T20991] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 855.532456][T20991] FAT-fs (loop3): Can't find a valid FAT filesystem 02:40:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$nfc_llcp(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "e553a8ee7f8a1fcc645fcfc9581426d71d371d1d8f83784f4484ceb9a0123677e166e6bdcc1b182d092a267a21b2d3e5ead6342ed1ee29fc367afffd6868c1"}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000140)="1767", 0x2}], 0x1, &(0x7f0000000200)={0x10}, 0x10}, 0x0) 02:40:32 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg(r0, &(0x7f0000000e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) 02:40:32 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 02:40:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xbf}}}, 0x90) 02:40:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:32 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0xfffffffffffff707) 02:40:32 executing program 2: socketpair(0xa, 0x5, 0x0, &(0x7f0000000040)) 02:40:33 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xc0) 02:40:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x24, 0x0, &(0x7f0000000080)) 02:40:33 executing program 4: r0 = socket(0x10, 0x802, 0x0) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:40:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:40:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x280}}], 0x1, 0x0) 02:40:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x3, 0x0, 0x300) 02:40:34 executing program 2: r0 = socket(0x18, 0x0, 0x1) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 02:40:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) 02:40:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 02:40:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 858.864411][T21048] vxfs: WRONG superblock magic 00000000 at 1 [ 858.944439][T21048] vxfs: WRONG superblock magic 00000000 at 8 [ 858.951196][T21048] vxfs: can't find superblock. 02:40:35 executing program 4: inotify_add_watch(0xffffffffffffffff, 0x0, 0x8fc41d3335b28bcb) 02:40:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000700)=0xffffffff, 0x4) 02:40:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000700), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 02:40:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2, &(0x7f0000000540)=ANY=[]) 02:40:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:35 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 02:40:36 executing program 2: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00') 02:40:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 02:40:36 executing program 3: socketpair(0x2, 0x5, 0x0, &(0x7f0000000040)) [ 859.957809][T21071] vxfs: WRONG superblock magic 00000000 at 1 02:40:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x806, r1, 0x1, 0x0, 0x6, @remote}, 0x14) [ 860.079424][T21071] vxfs: WRONG superblock magic 00000000 at 8 [ 860.085683][T21071] vxfs: can't find superblock. 02:40:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3, &(0x7f0000000540)=ANY=[]) 02:40:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7c2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040), 0xff, 0x0) 02:40:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x7, 0x0, 0x4) 02:40:37 executing program 3: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=virtio,', {[{@noextend}]}}) 02:40:37 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000004c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 861.252850][T21090] vxfs: WRONG superblock magic 00000000 at 1 [ 861.290222][T21090] vxfs: WRONG superblock magic 00000000 at 8 [ 861.296508][T21090] vxfs: can't find superblock. 02:40:38 executing program 3: syz_mount_image$f2fs(&(0x7f0000003480), &(0x7f00000034c0)='./file0\x00', 0x0, 0x2, &(0x7f0000004540)=[{&(0x7f0000003500)="f64dbab175903b0c948e2eaf0a96c266553d882ae39bef17746438b38abf049e0be219", 0x23}, {&(0x7f0000003540)="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", 0xffa, 0x4}], 0x0, &(0x7f0000004580)={[{@prjjquota={'prjjquota', 0x3d, '-'}}, {@quota}, {@noflush_merge}, {@alloc_mode_reuse}, {@six_active_logs}, {@fsync_mode_posix}, {@whint_mode_off}, {@lfs_mode}], [{@subj_user}]}) 02:40:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffb, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4, &(0x7f0000000540)=ANY=[]) 02:40:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname(r0, 0x0, &(0x7f0000000080)) 02:40:38 executing program 4: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000d80)='./file0\x00', 0xd6717f41c012e994, 0x0) [ 862.126518][T21118] loop3: detected capacity change from 0 to 7 [ 862.159624][T21118] F2FS-fs (loop3): Unable to read 1th superblock [ 862.166279][T21118] F2FS-fs (loop3): Unable to read 2th superblock 02:40:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) clock_gettime(0x0, &(0x7f0000003100)) recvmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2040, 0x0) [ 862.306752][T21118] loop3: detected capacity change from 0 to 7 [ 862.315463][T21118] F2FS-fs (loop3): Unable to read 1th superblock [ 862.322339][T21118] F2FS-fs (loop3): Unable to read 2th superblock [ 862.399677][T21130] vxfs: WRONG superblock magic 00000000 at 1 [ 862.406702][T21130] vxfs: WRONG superblock magic 00000000 at 8 [ 862.413318][T21130] vxfs: can't find superblock. 02:40:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @private1}, @in6={0xa, 0x4e23, 0x0, @private1}], 0x38) 02:40:39 executing program 3: syz_open_dev$media(&(0x7f0000000080), 0x800, 0x40) 02:40:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5, &(0x7f0000000540)=ANY=[]) 02:40:39 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000002c0), 0x4) 02:40:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:39 executing program 2: socketpair(0x18, 0x0, 0x3, &(0x7f0000000040)) [ 863.415230][T21146] vxfs: WRONG superblock magic 00000000 at 1 02:40:39 executing program 3: socket(0x2, 0x8000a, 0x2) [ 863.502931][T21146] vxfs: WRONG superblock magic 00000000 at 8 [ 863.509487][T21146] vxfs: can't find superblock. 02:40:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r0, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0x10, 0x84, 0x1}], 0x10}}], 0x1, 0x0) 02:40:39 executing program 5: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 02:40:40 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x541b, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000000000)=""/91) 02:40:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6, &(0x7f0000000540)=ANY=[]) 02:40:40 executing program 4: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=virtio,', {[], [{@subj_type={'subj_type', 0x3d, 'sysv\x00'}}]}}) 02:40:41 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg(r0, &(0x7f0000000e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}], 0x2, 0x40) [ 864.883024][T21171] vxfs: WRONG superblock magic 00000000 at 1 02:40:41 executing program 5: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) syz_mount_image$erofs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 864.961864][T21171] vxfs: WRONG superblock magic 00000000 at 8 [ 864.968046][T21171] vxfs: can't find superblock. 02:40:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:41 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x6}, &(0x7f0000000040)={0x4}, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) 02:40:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7, &(0x7f0000000540)=ANY=[]) 02:40:42 executing program 4: mknodat(0xffffffffffffffff, 0x0, 0xe602, 0x0) 02:40:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 02:40:42 executing program 5: syz_open_dev$video(&(0x7f00000002c0), 0x7, 0x24200) [ 866.143149][T21191] vxfs: WRONG superblock magic 00000000 at 1 [ 866.222679][T21191] vxfs: WRONG superblock magic 00000000 at 8 [ 866.229191][T21191] vxfs: can't find superblock. 02:40:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000240)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000380), &(0x7f00000003c0)=0x8) 02:40:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8, &(0x7f0000000540)=ANY=[]) 02:40:43 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x23, 0x0) 02:40:43 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x0, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x0, 0x2}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 02:40:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000080), 0x4) 02:40:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x0, 0x30}, 0xc) 02:40:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:43 executing program 5: open$dir(0x0, 0x410000, 0x0) [ 867.548251][T21210] vxfs: WRONG superblock magic 00000000 at 1 [ 867.622924][T21210] vxfs: WRONG superblock magic 00000000 at 8 [ 867.629250][T21210] vxfs: can't find superblock. 02:40:44 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nfc_llcp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x10}, 0x10}, 0x0) 02:40:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x9, &(0x7f0000000540)=ANY=[]) 02:40:44 executing program 4: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000680)='./file0/../file0\x00', 0x0, 0x0) 02:40:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x1}}], 0x30}, 0x0) 02:40:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmsg(r0, &(0x7f0000002400)={0x0, 0x0, 0x0}, 0x40) 02:40:45 executing program 3: syz_open_dev$media(&(0x7f0000000000), 0x0, 0x1) [ 868.857171][T21235] vxfs: WRONG superblock magic 00000000 at 1 [ 868.874617][T21235] vxfs: WRONG superblock magic 00000000 at 8 [ 868.880867][T21235] vxfs: can't find superblock. 02:40:45 executing program 5: pselect6(0x40, &(0x7f00000001c0)={0x6}, &(0x7f0000000200)={0x3}, 0x0, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 02:40:45 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$nfc_llcp(r0, &(0x7f0000001bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)={0x10}, 0x10}], 0x1, 0x0) 02:40:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x1d, 0x0, &(0x7f0000000080)) 02:40:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa, &(0x7f0000000540)=ANY=[]) 02:40:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:40:46 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x8906, r1, 0x1, 0x0, 0x6, @remote}, 0x14) 02:40:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000700), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 02:40:46 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000280)={0x3, "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"}, 0x401, 0x800) [ 870.002696][T21256] vxfs: WRONG superblock magic 00000000 at 1 [ 870.080821][T21256] vxfs: WRONG superblock magic 00000000 at 8 [ 870.087007][T21256] vxfs: can't find superblock. 02:40:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x6c, &(0x7f0000000040), &(0x7f0000000080)=0x8) [ 870.395696][T21260] vxfs: WRONG superblock magic 00000000 at 1 02:40:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb, &(0x7f0000000540)=ANY=[]) [ 870.493232][T21260] vxfs: WRONG superblock magic 00000000 at 8 [ 870.499949][T21260] vxfs: can't find superblock. 02:40:47 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000040), 0x4) 02:40:47 executing program 2: r0 = socket(0x1, 0x3, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000009a40)={0x0, 0x0, &(0x7f0000009a00)={0x0}}, 0x0) 02:40:47 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nfc_llcp(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000000)="f7", 0x1}, {&(0x7f0000000240)='~', 0x1}], 0x3, &(0x7f0000000580)={0x10}, 0x10}, 0x0) 02:40:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2, &(0x7f0000000540)=ANY=[]) [ 871.112870][T21279] vxfs: WRONG superblock magic 00000000 at 1 [ 871.121465][T21279] vxfs: WRONG superblock magic 00000000 at 8 [ 871.127533][T21279] vxfs: can't find superblock. 02:40:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc, &(0x7f0000000540)=ANY=[]) 02:40:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, 0x0, 0x0) 02:40:48 executing program 5: syz_mount_image$sysv(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x14000, 0x0) [ 871.763113][T21293] vxfs: WRONG superblock magic 00000000 at 1 [ 871.857501][T21293] vxfs: WRONG superblock magic 00000000 at 8 [ 871.861196][T21297] vxfs: WRONG superblock magic 00000000 at 1 [ 871.864013][T21293] vxfs: can't find superblock. [ 871.870598][T21297] vxfs: WRONG superblock magic 00000000 at 8 [ 871.882076][T21297] vxfs: can't find superblock. 02:40:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="98000000000000000600000002000000ac1696b1252fd0af26e11916ab050bf85a7570ba93fc21b16e125ee5c7b7fcc2cce8a568fce52ef7a29f65734f78ceebf82b1353f50b1a90fc3e67a2b99f3608a07234efa4644e9d26deb7519abe2bc176a2c34f1ea0ef9013afdb0846d6b2efc8f89f777f421bf381dee4857093a3a1a751c6f3cc1c6df2c88ac4e21f3182b4e7f6caff77210b69fcc6"], 0x280}}], 0x1, 0x0) 02:40:48 executing program 3: pipe(&(0x7f00000001c0)) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)={0x3, @bcast, 0xee01}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair(0x11, 0x3, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:40:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3, &(0x7f0000000540)=ANY=[]) 02:40:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd, &(0x7f0000000540)=ANY=[]) 02:40:48 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0x7, 0x0, 0x4) 02:40:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040), 0x4) 02:40:49 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, 0x0) [ 872.643449][T21315] vxfs: WRONG superblock magic 00000000 at 1 [ 872.657130][T21315] vxfs: WRONG superblock magic 00000000 at 8 [ 872.663598][T21315] vxfs: can't find superblock. 02:40:49 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 872.868740][T21322] vxfs: WRONG superblock magic 00000000 at 1 02:40:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4, &(0x7f0000000540)=ANY=[]) [ 872.941068][T21322] vxfs: WRONG superblock magic 00000000 at 8 [ 872.947315][T21322] vxfs: can't find superblock. 02:40:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r0, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x84, 0x80000001}], 0x10}}], 0x1, 0x0) 02:40:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe, &(0x7f0000000540)=ANY=[]) 02:40:49 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) connect$caif(r0, &(0x7f0000000000)=@rfm={0x25, 0x0, "89303d35cd6b9da5b7a317fd32c955db"}, 0x18) [ 873.453652][T21337] vxfs: WRONG superblock magic 00000000 at 1 [ 873.496653][T21337] vxfs: WRONG superblock magic 00000000 at 8 [ 873.503055][T21337] vxfs: can't find superblock. 02:40:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="a0", 0x1}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="2000000000000000840000000800000000000000000000000000000000000001180000000000000085000000050000002000000022fc000018000000000000008400e7ff06000000ffffffff0000000020000000000000008400000008"], 0x70}, 0x0) 02:40:50 executing program 2: socketpair(0x2b, 0x1, 0x0, &(0x7f00000003c0)) 02:40:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5, &(0x7f0000000540)=ANY=[]) 02:40:50 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)) [ 873.981043][T21349] vxfs: WRONG superblock magic 00000000 at 1 [ 874.005876][T21349] vxfs: WRONG superblock magic 00000000 at 8 [ 874.012417][T21349] vxfs: can't find superblock. 02:40:50 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$can_raw(r0, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) 02:40:50 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/4) 02:40:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf, &(0x7f0000000540)=ANY=[]) 02:40:50 executing program 2: r0 = socket(0x1, 0x1, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) [ 874.498349][T21363] vxfs: WRONG superblock magic 00000000 at 1 [ 874.605436][T21363] vxfs: WRONG superblock magic 00000000 at 8 [ 874.611917][T21363] vxfs: can't find superblock. 02:40:51 executing program 5: r0 = socket(0x18, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 02:40:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, @in6={0xa, 0x4e23, 0x0, @private1}], 0x38) [ 875.043812][T21374] vxfs: WRONG superblock magic 00000000 at 1 02:40:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6, &(0x7f0000000540)=ANY=[]) [ 875.135122][T21374] vxfs: WRONG superblock magic 00000000 at 8 [ 875.141553][T21374] vxfs: can't find superblock. 02:40:51 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, 0x0) 02:40:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x10, &(0x7f0000000540)=ANY=[]) 02:40:51 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x40000060) [ 875.633671][T21386] vxfs: WRONG superblock magic 00000000 at 1 [ 875.684952][T21386] vxfs: WRONG superblock magic 00000000 at 8 [ 875.691269][T21386] vxfs: can't find superblock. 02:40:52 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffff6c}, 0x0) 02:40:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) 02:40:52 executing program 2: r0 = socket(0x11, 0xa, 0x0) recvmsg$can_raw(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40000100) 02:40:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7, &(0x7f0000000540)=ANY=[]) [ 876.221929][T21397] vxfs: WRONG superblock magic 00000000 at 1 [ 876.301088][T21397] vxfs: WRONG superblock magic 00000000 at 8 [ 876.307450][T21397] vxfs: can't find superblock. 02:40:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6gre0\x00', 0x0}) 02:40:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x0, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0xf000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) 02:40:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000140)) 02:40:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@private0, 0x0, 0x1}, 0x20) 02:40:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x11, &(0x7f0000000540)=ANY=[]) [ 876.784446][T21411] vxfs: WRONG superblock magic 00000000 at 1 [ 876.819569][T21411] vxfs: WRONG superblock magic 00000000 at 8 [ 876.825670][T21411] vxfs: can't find superblock. 02:40:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12101, 0x0) 02:40:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8, &(0x7f0000000540)=ANY=[]) 02:40:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000480)=0x3, 0x4) 02:40:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001ec0)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001780)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x0) 02:40:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 02:40:53 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x0, 0x0, "1c43a5f5816e95c5a7599e035d67fbb577e0b28e059c59dd0adc03e5140776ab"}) [ 877.489475][T21428] vxfs: WRONG superblock magic 00000000 at 1 [ 877.553984][T21428] vxfs: WRONG superblock magic 00000000 at 8 [ 877.560455][T21428] vxfs: can't find superblock. [ 877.619764][T21432] vxfs: WRONG superblock magic 00000000 at 1 [ 877.679973][T21432] vxfs: WRONG superblock magic 00000000 at 8 [ 877.686152][T21432] vxfs: can't find superblock. 02:40:54 executing program 4: socket(0x1e, 0x0, 0x9) 02:40:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x12, &(0x7f0000000540)=ANY=[]) 02:40:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000013c0)={'gretap0\x00', 0x0}) [ 878.204750][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 878.211456][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 02:40:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x9, &(0x7f0000000540)=ANY=[]) 02:40:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4ea3, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='h\x00\x00\x00\x00\x00\x00\x00)'], 0x98}}], 0x1, 0x0) 02:40:54 executing program 2: syz_open_dev$video4linux(&(0x7f0000000140), 0xffffffffffffffff, 0x6040) [ 878.636706][T21452] vxfs: WRONG superblock magic 00000000 at 1 02:40:55 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x3, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000000)={0x3, 0x0, "515b50cf9af9319657b13379cbec6f45b252494bcd686871"}) 02:40:55 executing program 4: syz_open_dev$vbi(0xfffffffffffffffe, 0x3, 0x2) [ 878.770788][T21452] vxfs: WRONG superblock magic 00000000 at 8 [ 878.777187][T21452] vxfs: can't find superblock. 02:40:55 executing program 5: io_setup(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) [ 879.018777][T21459] vxfs: WRONG superblock magic 00000000 at 1 [ 879.028809][T21459] vxfs: WRONG superblock magic 00000000 at 8 [ 879.035262][T21459] vxfs: can't find superblock. 02:40:55 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x25, &(0x7f0000000540)=ANY=[]) 02:40:55 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 02:40:55 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000ac0)={'tunl0\x00', &(0x7f00000009c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @remote, {[@noop]}}}}}) 02:40:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa, &(0x7f0000000540)=ANY=[]) 02:40:55 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000005c0)={'wpan0\x00'}) [ 879.669571][T21475] serio: Serial port pts0 02:40:56 executing program 5: io_setup(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:40:56 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3a}, 0x0) 02:40:56 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) [ 880.272589][T21495] vxfs: WRONG superblock magic 00000000 at 1 [ 880.292323][T21495] vxfs: WRONG superblock magic 00000000 at 8 [ 880.298495][T21495] vxfs: can't find superblock. 02:40:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000400)={'security\x00', 0x4, "ada9a8b1"}, &(0x7f0000000080)=0x28) 02:40:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f, &(0x7f0000000540)=ANY=[]) 02:40:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=ANY=[], 0x8) 02:40:57 executing program 5: io_setup(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:40:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb, &(0x7f0000000540)=ANY=[]) 02:40:57 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x6500, 0x0) 02:40:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x48, &(0x7f0000000540)=ANY=[]) [ 881.354164][T21520] vxfs: WRONG superblock magic 00000000 at 1 [ 881.377465][T21521] serio: Serial port pts1 02:40:57 executing program 4: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x55162ba6aa2ee470) [ 881.474005][T21520] vxfs: WRONG superblock magic 00000000 at 8 [ 881.480638][T21520] vxfs: can't find superblock. 02:40:57 executing program 5: io_setup(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:40:58 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r0, 0x29, 0x8, 0x0, &(0x7f0000000040)) 02:40:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc, &(0x7f0000000540)=ANY=[]) [ 882.125041][T21536] vxfs: WRONG superblock magic 00000000 at 1 02:40:58 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000000)={'veth0_to_hsr\x00', @ifru_addrs=@l2tp={0x2, 0x0, @multicast1}}) [ 882.235809][T21536] vxfs: WRONG superblock magic 00000000 at 8 [ 882.242103][T21536] vxfs: can't find superblock. 02:40:58 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 882.484569][T21545] serio: Serial port pts1 02:40:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b80)={'ip6gre0\x00', &(0x7f0000005780)={'syztnl2\x00', 0x0, 0x0, 0x7, 0x0, 0x0, 0x3b, @private1={0xfc, 0x1, '\x00', 0x8}, @loopback, 0x0, 0x0, 0x10000002}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, &(0x7f0000000d00)) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000000)=@dstopts={0x33, 0x4, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0xee, 0xfff, [0x80000000, 0x7]}}, @pad1, @ra={0x5, 0x2, 0x6}]}, 0x30) 02:40:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c, &(0x7f0000000540)=ANY=[]) [ 882.781594][T21551] vxfs: WRONG superblock magic 00000000 at 1 [ 882.788706][T21551] vxfs: WRONG superblock magic 00000000 at 8 [ 882.795444][T21551] vxfs: can't find superblock. 02:40:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd, &(0x7f0000000540)=ANY=[]) 02:40:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000046c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @tclass={{0x14, 0x29, 0x43, 0x101}}], 0x40}}], 0x1, 0x0) 02:40:59 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x15, 0x7, 0x101, 0x100400, 0x4, 0xfffffffffffffffa, 0x800, 0x20}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 02:40:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 02:40:59 executing program 2: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) [ 883.425154][T21569] vxfs: WRONG superblock magic 00000000 at 1 [ 883.486097][T21569] vxfs: WRONG superblock magic 00000000 at 8 [ 883.492592][T21569] vxfs: can't find superblock. 02:40:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) dup3(r1, r0, 0x0) [ 883.637283][T21576] vxfs: WRONG superblock magic 00000000 at 1 [ 883.644906][T21576] vxfs: WRONG superblock magic 00000000 at 8 [ 883.651698][T21576] vxfs: can't find superblock. 02:41:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c, &(0x7f0000000540)=ANY=[]) 02:41:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe, &(0x7f0000000540)=ANY=[]) 02:41:00 executing program 4: syz_open_dev$video4linux(&(0x7f0000000140), 0xffffffffffffffff, 0x0) 02:41:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) dup3(r3, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 02:41:00 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x5b6b0656a7aebd4}, &(0x7f0000000080)=0x20) [ 884.596217][T21599] vxfs: WRONG superblock magic 00000000 at 1 [ 884.623775][T21599] vxfs: WRONG superblock magic 00000000 at 8 [ 884.630095][T21599] vxfs: can't find superblock. 02:41:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@empty, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000005780)={'syztnl2\x00', r1, 0x29, 0x2, 0x0, 0x0, 0x95, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x700, 0x7800}}) [ 884.807322][T21603] vxfs: WRONG superblock magic 00000000 at 1 [ 884.893014][T21603] vxfs: WRONG superblock magic 00000000 at 8 [ 884.899576][T21603] vxfs: can't find superblock. 02:41:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x60, &(0x7f0000000540)=ANY=[]) 02:41:01 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) write$dsp(r0, &(0x7f0000000600)="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", 0x540) 02:41:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf, &(0x7f0000000540)=ANY=[]) 02:41:01 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:41:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0xe, 0x0, 0x40}, 0x20) [ 886.210543][T21708] vxfs: WRONG superblock magic 00000000 at 1 02:41:02 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)=0x80000001) [ 886.314146][T21708] vxfs: WRONG superblock magic 00000000 at 8 [ 886.321545][T21708] vxfs: can't find superblock. [ 886.348631][T21726] serio: Serial port pts2 02:41:02 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:41:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x68, &(0x7f0000000540)=ANY=[]) [ 886.546714][T21752] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 02:41:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x10, &(0x7f0000000540)=ANY=[]) [ 887.215436][T21780] serio: Serial port pts1 02:41:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) dup3(r3, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 02:41:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) 02:41:03 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/54, 0x36}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f00000000c0)='}{(#%:\x00') close(r0) 02:41:03 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:41:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c, &(0x7f0000000540)=ANY=[]) 02:41:04 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000100), 0x0, 0x0, 0x29, 0xfffffffffffffffd) [ 887.738259][T21796] vxfs: WRONG superblock magic 00000000 at 1 [ 887.768319][T21796] vxfs: WRONG superblock magic 00000000 at 8 [ 887.774971][T21796] vxfs: can't find superblock. 02:41:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x11, &(0x7f0000000540)=ANY=[]) 02:41:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x0, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0x9}) 02:41:04 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)) [ 888.612009][T21868] serio: Serial port pts2 02:41:05 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 02:41:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x74, &(0x7f0000000540)=ANY=[]) [ 889.250467][T21919] vxfs: WRONG superblock magic 00000000 at 1 [ 889.286983][T21919] vxfs: WRONG superblock magic 00000000 at 8 [ 889.295479][T21919] vxfs: can't find superblock. 02:41:05 executing program 3: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 889.744320][T21949] serio: Serial port pts2 02:41:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) dup3(r3, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 02:41:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x12, &(0x7f0000000540)=ANY=[]) 02:41:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a, &(0x7f0000000540)=ANY=[]) 02:41:06 executing program 3: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "69606e95ce0ad7a5213a4547e556eadb"}, 0x15, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x260, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000600100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010036760000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 02:41:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040), 0x6, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, 0x0) 02:41:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 890.446527][T21981] vxfs: WRONG superblock magic 00000000 at 1 [ 890.504657][T21981] vxfs: WRONG superblock magic 00000000 at 8 [ 890.511094][T21981] vxfs: can't find superblock. 02:41:06 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000340), 0x0, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000003c0)={0x0, 0x101, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x0, 0x0, '\x00', @ptr}}) 02:41:07 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) [ 890.744989][T21991] loop3: detected capacity change from 0 to 140 [ 890.784679][T21991] EXT4-fs (loop3): bad geometry: block count 352 exceeds size of device (70 blocks) 02:41:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x25, &(0x7f0000000540)=ANY=[]) 02:41:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb9, &(0x7f0000000540)=ANY=[]) 02:41:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000000)=@pppoe, &(0x7f0000000080)=0x80) 02:41:08 executing program 5: r0 = socket(0x2, 0x2, 0x0) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "560cacf0c7eec3ea3ef8be5c76e10a1f4f3570278fbcd462e7ca690acebd177b3c2ba5ae7dfe2d7d17cbea0be57ecd8ef610a422c112dbf2e22cad2889766f"}, 0x60) 02:41:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = dup2(r1, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, "0000ba00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x15) dup3(r3, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 02:41:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x20) 02:41:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f, &(0x7f0000000540)=ANY=[]) 02:41:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfe, &(0x7f0000000540)=ANY=[]) 02:41:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) 02:41:09 executing program 5: openat$adsp1(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 02:41:09 executing program 5: accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x40000) 02:41:09 executing program 3: lstat(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) 02:41:09 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="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", 0x1000) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) 02:41:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x48, &(0x7f0000000540)=ANY=[]) 02:41:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x204, &(0x7f0000000540)=ANY=[]) 02:41:10 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2ccc49155c01004094dd82d48268976415469902ee4fa27824bdaa3fe6d00d23"}) [ 894.101492][T22259] vxfs: WRONG superblock magic 00000000 at 1 [ 894.108361][T22259] vxfs: WRONG superblock magic 00000000 at 8 [ 894.114885][T22259] vxfs: can't find superblock. [ 894.121314][T22255] vxfs: WRONG superblock magic 00000000 at 1 [ 894.145453][T22255] vxfs: WRONG superblock magic 00000000 at 8 [ 894.151852][T22255] vxfs: can't find superblock. 02:41:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x300, &(0x7f0000000540)=ANY=[]) 02:41:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b80)={'ip6gre0\x00', &(0x7f0000005780)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast2}}) 02:41:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c, &(0x7f0000000540)=ANY=[]) 02:41:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:41:11 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="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", 0x1000) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) 02:41:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) [ 895.391454][T22331] vxfs: WRONG superblock magic 00000000 at 1 [ 895.404881][T22331] vxfs: WRONG superblock magic 00000000 at 8 [ 895.411224][T22331] vxfs: can't find superblock. 02:41:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c, &(0x7f0000000540)=ANY=[]) [ 895.545044][T22337] vxfs: WRONG superblock magic 00000000 at 1 [ 895.565234][T22337] vxfs: WRONG superblock magic 00000000 at 8 [ 895.571643][T22337] vxfs: can't find superblock. 02:41:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @dev, 0x1, 0x700}}) 02:41:12 executing program 3: pselect6(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x100000000}, 0x0, 0x0) 02:41:12 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f0000004180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 02:41:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x346, &(0x7f0000000540)=ANY=[]) [ 896.184363][T22351] vxfs: WRONG superblock magic 00000000 at 1 [ 896.248864][T22351] vxfs: WRONG superblock magic 00000000 at 8 [ 896.257283][T22351] vxfs: can't find superblock. 02:41:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 02:41:12 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="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", 0x1000) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) [ 896.533788][T22361] vxfs: WRONG superblock magic 00000000 at 1 02:41:12 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000002c0), 0x3, 0x2) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000580)={0x0, "af8c6a4995e15bc64d35e96c7e30c9f8e5f8b6c9a49fce884dba4396bd10b795"}) [ 896.594842][T22361] vxfs: WRONG superblock magic 00000000 at 8 [ 896.601245][T22361] vxfs: can't find superblock. 02:41:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x60, &(0x7f0000000540)=ANY=[]) 02:41:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x402, &(0x7f0000000540)=ANY=[]) 02:41:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f00000000c0)=ANY=[]}) 02:41:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000080)={0x0, 0x4, 0x2, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @rand_addr=' \x01\x00']}, 0x28) 02:41:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x68, &(0x7f0000000540)=ANY=[]) 02:41:14 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="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", 0x1000) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) 02:41:14 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000300), 0x1, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000340)={0x2}) [ 897.762050][T22384] vxfs: WRONG superblock magic 00000000 at 1 [ 897.872703][T22384] vxfs: WRONG superblock magic 00000000 at 8 [ 897.879169][T22384] vxfs: can't find superblock. 02:41:14 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4041) 02:41:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x8, 0x0, &(0x7f0000000040)) 02:41:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x406, &(0x7f0000000540)=ANY=[]) 02:41:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b80)={'ip6gre0\x00', &(0x7f0000005780)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 02:41:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 02:41:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 02:41:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c, &(0x7f0000000540)=ANY=[]) [ 898.949447][T22407] vxfs: WRONG superblock magic 00000000 at 1 [ 899.013494][T22407] vxfs: WRONG superblock magic 00000000 at 8 [ 899.021445][T22407] vxfs: can't find superblock. 02:41:15 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x2b, 0x0) 02:41:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x500, &(0x7f0000000540)=ANY=[]) 02:41:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@dstopts, 0x8) 02:41:16 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="f1", 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000140)=0xfff) 02:41:16 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000300), 0x1, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0x3}) 02:41:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x74, &(0x7f0000000540)=ANY=[]) 02:41:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000b80)={'ip6gre0\x00', &(0x7f0000005780)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) [ 900.221358][T22428] vxfs: WRONG superblock magic 00000000 at 1 [ 900.236307][T22428] vxfs: WRONG superblock magic 00000000 at 8 [ 900.242754][T22428] vxfs: can't find superblock. 02:41:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x600, &(0x7f0000000540)=ANY=[]) 02:41:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f00000000c0)) 02:41:17 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r0, 0x0, 0x0) 02:41:17 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="f1", 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000140)=0xfff) [ 901.718745][T22462] vxfs: WRONG superblock magic 00000000 at 1 02:41:18 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, 0x0) 02:41:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a, &(0x7f0000000540)=ANY=[]) [ 901.795333][T22462] vxfs: WRONG superblock magic 00000000 at 8 [ 901.802175][T22462] vxfs: can't find superblock. 02:41:18 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 02:41:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000040), 0x4) 02:41:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x604, &(0x7f0000000540)=ANY=[]) 02:41:19 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="f1", 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000140)=0xfff) 02:41:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb9, &(0x7f0000000540)=ANY=[]) [ 903.169686][T22491] vxfs: WRONG superblock magic 00000000 at 1 [ 903.188565][T22491] vxfs: WRONG superblock magic 00000000 at 8 [ 903.195084][T22491] vxfs: can't find superblock. 02:41:19 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 02:41:19 executing program 5: sigaltstack(&(0x7f0000ff3000/0x1000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 02:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x402, 0x0, 0x0) 02:41:20 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x8202, 0x0) write$dsp(r0, &(0x7f0000000600)="f1", 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000140)=0xfff) 02:41:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x700, &(0x7f0000000540)=ANY=[]) 02:41:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfe, &(0x7f0000000540)=ANY=[]) 02:41:20 executing program 5: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) 02:41:20 executing program 4: mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 02:41:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x1c, 0x5, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x7, 0x2}, 0x10) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000000), &(0x7f0000000040)=0x18) 02:41:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000003340)={&(0x7f0000001e40)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000032c0)=[@init={0x14}, @init={0x14}], 0x28}, 0x0) [ 904.680612][T22522] vxfs: WRONG superblock magic 00000000 at 1 [ 904.728608][T22522] vxfs: WRONG superblock magic 00000000 at 8 [ 904.735115][T22522] vxfs: can't find superblock. 02:41:21 executing program 5: sigaltstack(&(0x7f0000ff3000/0x1000)=nil, 0x0) mmap(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x3, 0x410, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:41:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x204, &(0x7f0000000540)=ANY=[]) 02:41:21 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x2000) 02:41:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x200, &(0x7f0000001180), 0x4) 02:41:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x900, &(0x7f0000000540)=ANY=[]) 02:41:21 executing program 3: semget(0x3, 0x0, 0x784) 02:41:22 executing program 5: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) 02:41:22 executing program 4: select(0xff01, &(0x7f0000000000), &(0x7f0000000040), 0x0, 0x0) [ 905.832444][T22552] vxfs: WRONG superblock magic 00000000 at 1 [ 905.921770][T22552] vxfs: WRONG superblock magic 00000000 at 8 [ 905.927971][T22552] vxfs: can't find superblock. 02:41:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) [ 906.178034][T22562] vxfs: WRONG superblock magic 00000000 at 1 02:41:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x300, &(0x7f0000000540)=ANY=[]) [ 906.240846][T22562] vxfs: WRONG superblock magic 00000000 at 8 [ 906.247116][T22562] vxfs: can't find superblock. 02:41:22 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:41:22 executing program 4: r0 = socket(0x1c, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x7, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x32, &(0x7f0000000000)={r3, 0x3fe}, 0x8) 02:41:22 executing program 5: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x2800) r1 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r1, &(0x7f0000fff000/0x1000)=nil, 0x2000) 02:41:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa00, &(0x7f0000000540)=ANY=[]) 02:41:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000200), 0x88) 02:41:23 executing program 3: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) [ 906.955814][T22582] vxfs: WRONG superblock magic 00000000 at 1 [ 906.993682][T22582] vxfs: WRONG superblock magic 00000000 at 8 [ 907.000856][T22582] vxfs: can't find superblock. 02:41:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 02:41:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x30c, &(0x7f0000000540)=ANY=[]) 02:41:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 908.023446][T22597] vxfs: WRONG superblock magic 00000000 at 1 [ 908.062999][T22597] vxfs: WRONG superblock magic 00000000 at 8 [ 908.069480][T22597] vxfs: can't find superblock. 02:41:24 executing program 2: clock_nanosleep(0x5, 0x0, &(0x7f0000000000), 0x0) 02:41:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000bc0)="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", 0x55d}], 0x1}, 0x0) 02:41:24 executing program 4: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x1000) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) [ 908.525347][T22608] vxfs: WRONG superblock magic 00000000 at 1 02:41:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb00, &(0x7f0000000540)=ANY=[]) [ 908.591422][T22608] vxfs: WRONG superblock magic 00000000 at 8 [ 908.597538][T22608] vxfs: can't find superblock. 02:41:25 executing program 5: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x2}, 0x0, 0x0) select(0x40, &(0x7f0000000200)={0x5}, 0x0, &(0x7f0000000280), 0x0) 02:41:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x346, &(0x7f0000000540)=ANY=[]) 02:41:25 executing program 2: setrlimit(0x7, &(0x7f0000000000)={0x3, 0x7}) 02:41:25 executing program 4: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/54) [ 909.269333][T22623] vxfs: WRONG superblock magic 00000000 at 1 [ 909.289603][T22623] vxfs: WRONG superblock magic 00000000 at 8 [ 909.295778][T22623] vxfs: can't find superblock. 02:41:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000d00)="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", 0x595}], 0x1}, 0x0) sendto$inet(r1, &(0x7f00000000c0), 0x0, 0x104, 0x0, 0x0) 02:41:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc00, &(0x7f0000000540)=ANY=[]) [ 909.764314][T22633] vxfs: WRONG superblock magic 00000000 at 1 [ 909.774111][T22633] vxfs: WRONG superblock magic 00000000 at 8 [ 909.780779][T22633] vxfs: can't find superblock. 02:41:26 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x63) 02:41:26 executing program 2: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) 02:41:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) read(r0, &(0x7f0000000640)=""/67, 0x43) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000080)={0x0, 0x10000}, 0x10) recvfrom$inet(r1, 0x0, 0x350, 0x0, 0x0, 0x800e004fe) shutdown(r1, 0x0) 02:41:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x402, &(0x7f0000000540)=ANY=[]) [ 910.443425][T22645] vxfs: WRONG superblock magic 00000000 at 1 02:41:26 executing program 3: syz_emit_ethernet(0xfff, &(0x7f0000000900)={@broadcast, @broadcast, @val, {@generic={0x0, "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"}}}, 0x0) [ 910.499615][T22645] vxfs: WRONG superblock magic 00000000 at 8 [ 910.505809][T22645] vxfs: can't find superblock. 02:41:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) 02:41:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc24, &(0x7f0000000540)=ANY=[]) [ 910.989550][T22661] vxfs: WRONG superblock magic 00000000 at 1 [ 911.105986][T22661] vxfs: WRONG superblock magic 00000000 at 8 [ 911.112725][T22661] vxfs: can't find superblock. 02:41:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000f40), 0x4) 02:41:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc25, &(0x7f0000000540)=ANY=[]) 02:41:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x406, &(0x7f0000000540)=ANY=[]) 02:41:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) 02:41:28 executing program 2: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x1000) 02:41:28 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 02:41:28 executing program 4: mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) 02:41:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc26, &(0x7f0000000540)=ANY=[]) [ 912.376028][T22694] vxfs: WRONG superblock magic 00000000 at 1 [ 912.404834][T22694] vxfs: WRONG superblock magic 00000000 at 8 [ 912.411261][T22694] vxfs: can't find superblock. 02:41:29 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 02:41:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x500, &(0x7f0000000540)=ANY=[]) 02:41:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup2(r5, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000000080)={r7}, 0x8) 02:41:29 executing program 4: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r1 = shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmdt(r1) r2 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r3 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r4 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r4, &(0x7f0000ca2000/0x1000)=nil, 0x1000) shmctl$IPC_SET(0x0, 0x1, 0x0) shmat(r3, &(0x7f000044e000/0x3000)=nil, 0x0) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x0) 02:41:29 executing program 5: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r1 = shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmdt(r1) r2 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmdt(0x0) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x0) 02:41:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd00, &(0x7f0000000540)=ANY=[]) [ 913.670120][T22724] vxfs: WRONG superblock magic 00000000 at 1 [ 913.735369][T22724] vxfs: WRONG superblock magic 00000000 at 8 [ 913.741953][T22724] vxfs: can't find superblock. 02:41:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000000c0)="1f15b2ed17f2d1de837092512eb7e887bee54e664284c7b766c4d288a5b30e8cdcf81029112dfc2617b10eb2099e4a6f766f8990aea6b1bc0183651cec5d583394c3cf3edefc3f957e2121877e53a1a2214f8bbc57ff19090e5f46fa27e799b841236fa0061c3919209ee8d539fad0d22653beadce627b2aea0bf27b19eb598f06071ae39feb4982f5a96d8d5a74f97d5247e1299de5de2c578bec7a83217e038b276021f0000a1ae6c1e553a3052315064c499afb36be0135dc23be0522e559bdcc013cf327c1e31a9df5c0b48b2af915c0a8566e966b69e54267d1a8cef5c8b3a777c9371e07", 0xe7}, {&(0x7f00000001c0)="90fdc0b024c44260304965e40be95ed748f5066997350253c0d191aeb69d69c7604f73fea1dc09a7a6d446d724d84effc55a28e4822bb755cf7ba2f3363c48018978860e67f9de871d052adda0c72913e184862b33a265c9f78dbdaf83a2b4418912c0f253ec50f10d344a9937e914264430567ad683e01d6059e13634485df38a4f111fd987ff5c8ae33da14d1666b8545fb06a5ff695ebc008f73cf6c3bd4407b98bb4c3e6898448ba1e5a6c1846a22efe03d870", 0xb5}, {&(0x7f0000000340)="1e68d2464ff411d8242353e3dc715f7bad7629b8aa6e38c5eae5e68b2f04d8a36fd13d0d43855545b24cc4b9c2cc654c834e1a4e50278de9d36cd07527934add00b2be576604494aa238a5b1bfc7b92e8096874c9ceebbb289a1faedf497d9914f1182db02af46b0dda31bdd85063a812ba9154fde5438f95f839b8cdc84074b991b1e9aa596a164641d6cf5415b999e7f762d86c22341016049931da410d309f954f70d2c744cc4fe94ed43bbfc5149e2cc645ed97a4988643957d8da730102df24261b77bb59a67773e73e0195", 0xce}, {&(0x7f0000000440)="a2dda9ee9a0c307c2f031fabb58010859b103ac765c7746a5efdfbdad5651e7b6eaea9f9f8462261f317e3e858a959c227b65defeb3a672aac52a47a9192ca8b7567eb4f5e5457d34b0aec9c1e95ce1bb49262d2cb0d219a24e0b75d555897513d33b9382d9147c0cb381d48c9d3802f223963d045d0fa772ee1caf2", 0x7c}, {&(0x7f0000000280)="c4265a23b54bef1a507096916782b0a1052da71e02fbe4232b4a4841dd388c6a6fe3c5003742d23cbd1ed1d633f8f22eb9140fc686f1", 0x36}, {&(0x7f0000000500)="07b18a038bd908360dec62bef5021168b795357107d8d2ff21f9b8e2e77103535f3803f78a4b94b905fd8578bd50121a747a1afc4342a9d8d738f9b5e31aa8d725fb4bf3c5bb1f01a0576a6ab8eb38ab269613e6369c96a9023e6a188a3d9e15b078b001f179a8f9f18a319d409e5cab391d314bad3ad03421e66ad03849b78d0cc0ee4604117e97802628285baef3236dac9c34ad52dea7e46ae4749b7a20b15955", 0xa2}, {&(0x7f0000000c40)="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", 0xcba}], 0x7}, 0x0) 02:41:30 executing program 4: readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 02:41:30 executing program 5: clock_nanosleep(0xe, 0x0, &(0x7f0000000040), 0x0) 02:41:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000000c0)="1f15b2ed17f2d1de837092512eb7e887bee54e664284c7b766c4d288a5b30e8cdcf81029112dfc2617b10eb2099e4a6f766f8990aea6b1bc0183651cec5d583394c3cf3edefc3f957e2121877e53a1a2214f8bbc57ff19090e5f46fa27e799b841236fa0061c3919209ee8d539fad0d22653beadce627b2aea0bf27b19eb598f06071ae39feb4982f5a96d8d5a74f97d5247e1299de5de2c578bec7a83217e038b276021f0000a1ae6c1e553a3052315064c499afb36be0135dc23be0522e559bdcc013cf327c1e31a9df5c0b48b2af915c0a8566e966b69e54267d1a8cef5c8b3a777c9371e07", 0xe7}, {&(0x7f00000001c0)="90fdc0b024c44260304965e40be95ed748f5066997350253c0d191aeb69d69c7604f73fea1dc09a7a6d446d724d84effc55a28e4822bb755cf7ba2f3363c48018978860e67f9de871d052adda0c72913e184862b33a265c9f78dbdaf83a2b4418912c0f253ec50f10d344a9937e914264430567ad683e01d6059e13634485df38a4f111fd987ff5c8ae33da14d1666b8545fb06a5ff695ebc008f73cf6c3bd4407b98bb4c3e6898448ba1e5a6c1846a22efe03d870", 0xb5}, {&(0x7f0000000340)="1e68d2464ff411d8242353e3dc715f7bad7629b8aa6e38c5eae5e68b2f04d8a36fd13d0d43855545b24cc4b9c2cc654c834e1a4e50278de9d36cd07527934add00b2be576604494aa238a5b1bfc7b92e8096874c9ceebbb289a1faedf497d9914f1182db02af46b0dda31bdd85063a812ba9154fde5438f95f839b8cdc84074b991b1e9aa596a164641d6cf5415b999e7f762d86c22341016049931da410d309f954f70d2c744cc4fe94ed43bbfc5149e2cc645ed97a4988643957d8da730102df24261b77bb59a67773e73e0195", 0xce}, {&(0x7f0000000440)="a2dda9ee9a0c307c2f031fabb58010859b103ac765c7746a5efdfbdad5651e7b6eaea9f9f8462261f317e3e858a959c227b65defeb3a672aac52a47a9192ca8b7567eb4f5e5457d34b0aec9c1e95ce1bb49262d2cb0d219a24e0b75d555897513d33b9382d9147c0cb381d48c9d3802f223963d045d0fa772ee1caf279da2b069d989c83", 0x84}, {&(0x7f0000000280)="c4265a23b54bef1a507096916782b0a1052da71e02fbe4232b4a4841dd388c6a6fe3c5003742d23cbd1ed1d633f8f22eb9140fc686f1", 0x36}, {&(0x7f0000000500)="07b18a038bd908360dec62bef5021168b795357107d8d2ff21f9b8e2e77103535f3803f78a4b94b905fd8578bd50121a747a1afc4342a9d8d738f9b5e31aa8d725fb4bf3c5bb1f01a0576a6ab8eb38ab269613e6369c96a9023e6a188a3d9e15b078b001f179a8f9f18a319d409e5cab391d314bad3ad03421e66ad03849b78d0cc0ee4604117e97802628285baef3236dac9c34ad52dea7e46ae4749b7a20b15955", 0xa2}, {&(0x7f0000000c40)="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", 0xcb2}], 0x7}, 0x0) 02:41:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x600, &(0x7f0000000540)=ANY=[]) [ 914.346065][T22745] vxfs: WRONG superblock magic 00000000 at 1 [ 914.353283][T22745] vxfs: WRONG superblock magic 00000000 at 8 [ 914.359981][T22745] vxfs: can't find superblock. 02:41:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe00, &(0x7f0000000540)=ANY=[]) [ 915.028504][T22758] vxfs: WRONG superblock magic 00000000 at 1 [ 915.036448][T22758] vxfs: WRONG superblock magic 00000000 at 8 [ 915.043025][T22758] vxfs: can't find superblock. 02:41:31 executing program 5: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmat(r0, &(0x7f0000ff4000/0xa000)=nil, 0x1000) 02:41:31 executing program 3: sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 02:41:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 02:41:31 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 02:41:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x604, &(0x7f0000000540)=ANY=[]) [ 915.401923][T22767] vxfs: WRONG superblock magic 00000000 at 1 [ 915.440175][T22767] vxfs: WRONG superblock magic 00000000 at 8 [ 915.446465][T22767] vxfs: can't find superblock. 02:41:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf00, &(0x7f0000000540)=ANY=[]) 02:41:32 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 915.945010][T22782] vxfs: WRONG superblock magic 00000000 at 1 [ 915.952538][T22782] vxfs: WRONG superblock magic 00000000 at 8 [ 915.958742][T22782] vxfs: can't find superblock. 02:41:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={r2}, 0x8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x24, &(0x7f0000000040)=0x206, 0xffac) 02:41:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000000c0)="29ed0b439a284f82352dfe5a51a8cd0c27347838866f12e394e5e50adbd9f2b12d2d6cd532076ff2ba9cf8a42097a91fcdc421a3701a8dcb3d3b365873b541", 0x3f}, {&(0x7f0000000100)="951c8a52afcc1a", 0x7}, {&(0x7f0000000340)="3ae6ab6db29ae872dec313e50b367a5baf4f7de255acba6d6cfd703f3311a76a98277e9c5349ee2721e5e5b9ed6f1f46b86df9326b397785e3cfe3e18523", 0x3e}, {&(0x7f00000003c0)="2c842dc519a9a460ef2aa0464c256d54f0f52a84f2", 0x15}], 0x4}, 0x0) 02:41:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x700, &(0x7f0000000540)=ANY=[]) [ 916.427768][T22795] vxfs: WRONG superblock magic 00000000 at 1 [ 916.436947][T22795] vxfs: WRONG superblock magic 00000000 at 8 [ 916.443515][T22795] vxfs: can't find superblock. 02:41:32 executing program 4: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x2800) r1 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r2 = shmat(r1, &(0x7f0000fff000/0x1000)=nil, 0x2000) r3 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r4 = shmat(r3, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmdt(r4) shmdt(r2) 02:41:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000080)=0x5, 0x4) 02:41:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1020, &(0x7f0000000540)=ANY=[]) [ 916.960238][T22811] vxfs: WRONG superblock magic 00000000 at 1 02:41:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) [ 917.080399][T22811] vxfs: WRONG superblock magic 00000000 at 8 [ 917.086629][T22811] vxfs: can't find superblock. 02:41:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x53, &(0x7f0000000100)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x108) 02:41:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x900, &(0x7f0000000540)=ANY=[]) 02:41:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x101) shutdown(r0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x220}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0}, 0x0) 02:41:34 executing program 4: mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 02:41:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1100, &(0x7f0000000540)=ANY=[]) 02:41:34 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, 0x0, 0x290}, 0x0) shutdown(r0, 0x1) 02:41:34 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x100000000}, 0x0) [ 918.217662][T22836] vxfs: WRONG superblock magic 00000000 at 1 [ 918.308798][T22836] vxfs: WRONG superblock magic 00000000 at 8 [ 918.315430][T22836] vxfs: can't find superblock. 02:41:35 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 02:41:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000000c0)=')', 0x1}], 0x1}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)='z', 0x29}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0x8) 02:41:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa00, &(0x7f0000000540)=ANY=[]) 02:41:35 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 02:41:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1200, &(0x7f0000000540)=ANY=[]) 02:41:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x4, 0x0, &(0x7f00000000c0)) 02:41:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) [ 919.367168][T22869] vxfs: WRONG superblock magic 00000000 at 1 [ 919.435895][T22869] vxfs: WRONG superblock magic 00000000 at 8 [ 919.442461][T22869] vxfs: can't find superblock. 02:41:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2000, &(0x7f0000000540)=ANY=[]) 02:41:36 executing program 5: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000040)=""/190) 02:41:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@authinfo={0x10}], 0x10}, 0x0) 02:41:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x101) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x220}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xac}, 0x0) 02:41:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb00, &(0x7f0000000540)=ANY=[]) 02:41:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000d00)="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", 0x5ad}], 0x1}, 0x0) 02:41:37 executing program 5: syz_emit_ethernet(0x16, &(0x7f0000000900)={@broadcast, @broadcast}, 0x0) 02:41:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2010, &(0x7f0000000540)=ANY=[]) [ 920.645152][T22905] vxfs: WRONG superblock magic 00000000 at 1 02:41:37 executing program 2: syz_emit_ethernet(0xe, &(0x7f0000000280)={@empty, @random="e5df8a0f808d"}, 0x0) [ 920.743021][T22905] vxfs: WRONG superblock magic 00000000 at 8 [ 920.749571][T22905] vxfs: can't find superblock. 02:41:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x200c2, 0x0, 0x0) 02:41:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xbc5, &(0x7f0000000540)=ANY=[]) 02:41:37 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x6, 0x2}, 0xfffffffffffffd76) 02:41:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x240c, &(0x7f0000000540)=ANY=[]) 02:41:37 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x210081, 0x0) 02:41:37 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x80003, 0x0) [ 921.664460][T22929] vxfs: WRONG superblock magic 00000000 at 1 [ 921.700693][T22929] vxfs: WRONG superblock magic 00000000 at 8 [ 921.707051][T22929] vxfs: can't find superblock. 02:41:38 executing program 4: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r1 = shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmdt(r1) r2 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r3 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) shmat(r3, &(0x7f0000fff000/0x1000)=nil, 0x0) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x0) 02:41:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f00000000c0)={r5}, 0x8) 02:41:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000040)=0x3d) 02:41:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2500, &(0x7f0000000540)=ANY=[]) 02:41:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xbc6, &(0x7f0000000540)=ANY=[]) 02:41:38 executing program 2: socketpair(0x2, 0x20000001, 0x0, 0x0) 02:41:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000040), 0x8) [ 922.755739][T22965] vxfs: WRONG superblock magic 00000000 at 1 [ 922.850795][T22965] vxfs: WRONG superblock magic 00000000 at 8 [ 922.857209][T22965] vxfs: can't find superblock. 02:41:39 executing program 5: clock_settime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000040)={0x3148}) 02:41:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x250c, &(0x7f0000000540)=ANY=[]) 02:41:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0x202}, 0x98) 02:41:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x4a, 0x0, 0x0) 02:41:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000bc0)="bc", 0x1}], 0x1}, 0x0) accept4(r0, 0x0, 0x0, 0x0) 02:41:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xbc7, &(0x7f0000000540)=ANY=[]) 02:41:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x101) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b"], 0xbc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x220}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xac}, 0x0) 02:41:40 executing program 4: sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 02:41:40 executing program 5: clock_settime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000040)={0x3148}) 02:41:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x260c, &(0x7f0000000540)=ANY=[]) [ 924.225287][T23002] vxfs: WRONG superblock magic 00000000 at 1 02:41:40 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) [ 924.310655][T23002] vxfs: WRONG superblock magic 00000000 at 8 [ 924.316765][T23002] vxfs: can't find superblock. 02:41:41 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000080)="bf", 0x1}], 0x1}, 0x0) 02:41:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc00, &(0x7f0000000540)=ANY=[]) 02:41:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x400, &(0x7f0000000080), 0x4) 02:41:41 executing program 5: clock_settime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000040)={0x3148}) 02:41:41 executing program 3: sigaltstack(&(0x7f0000ff3000/0x1000)=nil, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mmap(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 02:41:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f00, &(0x7f0000000540)=ANY=[]) [ 925.523577][T23034] vxfs: WRONG superblock magic 00000000 at 1 02:41:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10}, 0x10) sendto$inet(r1, &(0x7f0000002600)="ce", 0x1, 0x0, &(0x7f00000025c0)={0x10}, 0x10) [ 925.634248][T23034] vxfs: WRONG superblock magic 00000000 at 8 [ 925.641573][T23034] vxfs: can't find superblock. 02:41:42 executing program 5: clock_settime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000040)={0x3148}) 02:41:42 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8}, 0x14) 02:41:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc03, &(0x7f0000000540)=ANY=[]) 02:41:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 02:41:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3f00, &(0x7f0000000540)=ANY=[]) 02:41:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x50) 02:41:42 executing program 5: r0 = shmget(0x2, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r1 = shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmdt(r1) [ 926.976071][T23068] vxfs: WRONG superblock magic 00000000 at 1 [ 926.984263][T23068] vxfs: WRONG superblock magic 00000000 at 8 [ 926.990725][T23068] vxfs: can't find superblock. 02:41:43 executing program 3: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 02:41:43 executing program 5: linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 02:41:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendto$inet(r1, &(0x7f00000000c0)="687d98df57", 0x5, 0x0, 0x0, 0x0) 02:41:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4000, &(0x7f0000000540)=ANY=[]) 02:41:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd00, &(0x7f0000000540)=ANY=[]) 02:41:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x656, 0x1, 'u'}, 0x9) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 02:41:44 executing program 4: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080), 0x0) 02:41:44 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x4000) syz_open_dev$dri(&(0x7f000000d980), 0x0, 0x0) [ 927.996633][T23096] vxfs: WRONG superblock magic 00000000 at 1 [ 928.063799][T23096] vxfs: WRONG superblock magic 00000000 at 8 [ 928.070289][T23096] vxfs: can't find superblock. 02:41:44 executing program 3: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x100000001}, &(0x7f0000000080), &(0x7f0000000100)) 02:41:44 executing program 4: socketpair(0x0, 0x254ac7eff6607e15, 0x0, 0x0) [ 928.230787][T23101] vxfs: WRONG superblock magic 00000000 at 1 [ 928.315078][T23101] vxfs: WRONG superblock magic 00000000 at 8 [ 928.321638][T23101] vxfs: can't find superblock. 02:41:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4603, &(0x7f0000000540)=ANY=[]) 02:41:44 executing program 2: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0) 02:41:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe00, &(0x7f0000000540)=ANY=[]) 02:41:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x6100, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0xb3, &(0x7f0000000140)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:41:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) 02:41:45 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000004780)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000004980), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000049c0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e231af97"}, 0x0, 0x0, @userptr}) openat$cgroup_ro(r0, &(0x7f0000004ec0)='cpu.stat\x00', 0x0, 0x0) [ 929.191027][T23119] vxfs: WRONG superblock magic 00000000 at 1 [ 929.201033][T23119] vxfs: WRONG superblock magic 00000000 at 8 [ 929.207235][T23119] vxfs: can't find superblock. 02:41:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4800, &(0x7f0000000540)=ANY=[]) [ 929.384760][T23126] vxfs: WRONG superblock magic 00000000 at 1 02:41:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0xf4240, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f0000000100)='GPL\x00', 0x0, 0xb3, &(0x7f0000000140)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 929.459457][T23126] vxfs: WRONG superblock magic 00000000 at 8 [ 929.465589][T23126] vxfs: can't find superblock. 02:41:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf00, &(0x7f0000000540)=ANY=[]) 02:41:46 executing program 3: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:41:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="0640", 0x2, 0x40000, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) [ 930.156234][T23142] vxfs: WRONG superblock magic 00000000 at 1 [ 930.214092][T23142] vxfs: WRONG superblock magic 00000000 at 8 [ 930.220456][T23142] vxfs: can't find superblock. 02:41:46 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000007540)='./cgroup/syz0\x00', 0x200002, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000007740), 0x0, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000007800), 0x351400, 0x0) [ 930.489600][T23151] vxfs: WRONG superblock magic 00000000 at 1 [ 930.568165][T23151] vxfs: WRONG superblock magic 00000000 at 8 [ 930.574679][T23151] vxfs: can't find superblock. 02:41:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c00, &(0x7f0000000540)=ANY=[]) 02:41:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1020, &(0x7f0000000540)=ANY=[]) 02:41:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3e3, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0xb3, &(0x7f0000000140)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:41:47 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000007600)) 02:41:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 931.465539][T23164] vxfs: WRONG superblock magic 00000000 at 1 [ 931.524307][T23164] vxfs: WRONG superblock magic 00000000 at 8 [ 931.530785][T23164] vxfs: can't find superblock. 02:41:48 executing program 4: request_key(&(0x7f0000001400)='user\x00', &(0x7f0000001440)={'syz', 0x3}, &(0x7f0000001480)='{\'\x00', 0xffffffffffffffff) 02:41:48 executing program 3: syz_open_dev$dri(&(0x7f000000d980), 0x0, 0x0) 02:41:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c00, &(0x7f0000000540)=ANY=[]) 02:41:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1100, &(0x7f0000000540)=ANY=[]) 02:41:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0xf4240, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f0000000100)='GPL\x00', 0x3, 0xb3, &(0x7f0000000140)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:41:48 executing program 4: socketpair(0x3, 0x0, 0xffff, &(0x7f0000000000)) 02:41:48 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040), 0x101080, 0x0) 02:41:49 executing program 3: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) 02:41:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6000, &(0x7f0000000540)=ANY=[]) 02:41:49 executing program 2: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x100000001}, 0x0, 0x0) 02:41:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000580)={'wpan3\x00'}) 02:41:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1200, &(0x7f0000000540)=ANY=[]) 02:41:49 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000580)={'wpan3\x00'}) 02:41:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6800, &(0x7f0000000540)=ANY=[]) 02:41:50 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x2000008) 02:41:50 executing program 2: r0 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="83", 0x1, 0xffffffffffffffff) keyctl$describe(0x6, r0, 0x0, 0x0) 02:41:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2000, &(0x7f0000000540)=ANY=[]) 02:41:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c00, &(0x7f0000000540)=ANY=[]) 02:41:50 executing program 4: add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="83", 0x1, 0xffffffffffffffff) 02:41:51 executing program 3: add_key$keyring(&(0x7f0000000400), 0x0, 0x0, 0x0, 0x0) 02:41:51 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 02:41:51 executing program 2: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000004980), 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 02:41:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2010, &(0x7f0000000540)=ANY=[]) 02:41:51 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000004780)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) 02:41:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7400, &(0x7f0000000540)=ANY=[]) 02:41:51 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 02:41:52 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000070000000000000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000851000000000e8"], &(0x7f0000002480)='GPL\x00', 0x3, 0xeb, &(0x7f00000024c0)=""/235, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:41:52 executing program 2: socketpair(0x22, 0x0, 0x7fff, &(0x7f0000000000)) 02:41:52 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000085100000000000001800000005000000000000000000000009500000000001009500000000000000a10900728872e19c96adb06d9590325e93b48e12bd4bdf7d03656527ad080000005befd9b0376c67da0c476bac474cee6596a044e0b6c6d8de32b0647a286c7d29804fd948ccd600c0db9f75573b5d179c9313f1"], 0x0, 0x3, 0xeb, &(0x7f00000024c0)=""/235, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002600)={0x7, 0x1}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_btf_id_by_name$bpf_lsm(&(0x7f0000000480)='bpf_lsm_bprm_creds_for_exec\x00') r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0x4, &(0x7f0000002400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@func]}, &(0x7f0000002480)='GPL\x00', 0x0, 0xeb, &(0x7f00000024c0)=""/235, 0x41100, 0x12, '\x00', 0x0, 0x1b, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002640)={0x1, 0x9}, 0x10}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0x8, &(0x7f0000002400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@exit, @func, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @generic={0x9, 0x0, 0x0, 0x0, 0x10000}]}, &(0x7f0000002480)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002600)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x5, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f}, [@generic={0x68}, @ldst={0x3, 0x0, 0x3}]}, 0x0, 0x5, 0x2, &(0x7f0000000580)=""/2, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xf, 0x3f, 0x3a}, 0x10}, 0x78) sendto$inet6(r0, &(0x7f0000000000)="06407f0e89dfe464a3cbc9cfbcbaa31ea3ead6a22356436c22794a3bc344f241bb7d9f13b2a4c11bcf1b15ae06321038bf6edb17ec44cde9", 0x38, 0x40000, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @remote, 0x6}, 0x1c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 02:41:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), r0) 02:41:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2500, &(0x7f0000000540)=ANY=[]) 02:41:52 executing program 5: futex(0x0, 0x0, 0x0, &(0x7f0000004900), 0x0, 0x0) 02:41:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a00, &(0x7f0000000540)=ANY=[]) 02:41:52 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 02:41:53 executing program 5: recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 02:41:53 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) 02:41:53 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) 02:41:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f00, &(0x7f0000000540)=ANY=[]) 02:41:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb900, &(0x7f0000000540)=ANY=[]) 02:41:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x3e3, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f0000000100)='GPL\x00', 0x3, 0xb3, &(0x7f0000000140)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:41:54 executing program 5: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x402c40, 0x0) 02:41:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000700), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) 02:41:54 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) 02:41:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xedc0, &(0x7f0000000540)=ANY=[]) 02:41:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3f00, &(0x7f0000000540)=ANY=[]) 02:41:55 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 02:41:55 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000025c0), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000070000000000000000000000950000000000000018"], &(0x7f0000002480)='GPL\x00', 0x3, 0xeb, &(0x7f00000024c0)=""/235, 0x41100, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000002600)={0x0, 0x1}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0, 0x4}, 0x20) syz_btf_id_by_name$bpf_lsm(&(0x7f0000000480)='bpf_lsm_bprm_creds_for_exec\x00') r1 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000025c0), 0x200800, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) syz_btf_id_by_name$bpf_lsm(&(0x7f0000002380)='bpf_lsm_fs_context_parse_param\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x4, &(0x7f00000004c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000540)='GPL\x00', 0x0, 0x2, &(0x7f0000000580)=""/2, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x3, 0x4}, 0x8, 0x10, 0x0}, 0x78) sendto$inet6(r1, &(0x7f0000000000)="06407f0e89dfe464a3cbc9cfbcbaa31ea3ead6a22356436c22794a3bc344f241bb7d9f13b2a4c11bcf1b15ae06321038bf6edb17ec44cde92fb57172fcc6091fba0f513127dbc0820cf03587b4d9c6cd55ad485d4f8c82578490bce7261ebeb6e9f8", 0x62, 0x40000, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @remote, 0x6}, 0x1c) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_lsm={0x1d, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000700000000000000000000009500000000000000181000009110aab7e06f33eda136744bd053694acbe51f30e02946a843e085f55e32ac72da3c3f72be7301af462e9a29794f1e33f61fe4c31ac670559b805b428734ff", @ANYRES32, @ANYBLOB="000000000000000085100000000000001800000005000000000000000100000009500000"], &(0x7f0000002480)='GPL\x00', 0x3, 0xeb, &(0x7f00000024c0)=""/235, 0x41100, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000002600)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002640)={0x1, 0x9, 0x401}, 0x10}, 0x78) 02:41:55 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname$inet6(r0, 0x0, 0x0) 02:41:55 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x3, 0x7) sendto$inet(r1, 0x0, 0x0, 0x4, &(0x7f0000000540)={0x2, 0x0, @remote}, 0x10) 02:41:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4000, &(0x7f0000000540)=ANY=[]) [ 939.653498][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 939.660202][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 02:41:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = getpgrp(0x0) setpgid(r1, 0xffffffffffffffff) 02:41:56 executing program 4: prctl$PR_SET_UNALIGN(0x6, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000001380)='/proc/cgroups\x00', 0x0, 0x0) 02:41:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfeff, &(0x7f0000000540)=ANY=[]) 02:41:56 executing program 3: r0 = socket$inet(0x2, 0x2, 0x2000000088) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 940.310816][T23367] vxfs: WRONG superblock magic 00000000 at 1 [ 940.403767][T23367] vxfs: WRONG superblock magic 00000000 at 8 [ 940.410356][T23367] vxfs: can't find superblock. 02:41:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="06", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) 02:41:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff00, &(0x7f0000000540)=ANY=[]) 02:41:57 executing program 4: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 02:41:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r1}}, 0x10) 02:41:57 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIO_WAITFORVSYNC(r0, 0x40044620, 0x0) 02:41:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4603, &(0x7f0000000540)=ANY=[]) 02:41:57 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 02:41:58 executing program 4: socketpair(0x1, 0x0, 0x4, &(0x7f00000002c0)) [ 941.772243][T23404] vxfs: WRONG superblock magic 00000000 at 1 [ 941.780125][T23404] vxfs: WRONG superblock magic 00000000 at 8 [ 941.786260][T23404] vxfs: can't find superblock. 02:41:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff0f, &(0x7f0000000540)=ANY=[]) 02:41:58 executing program 3: socket(0x0, 0x0, 0x7f) 02:41:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4800, &(0x7f0000000540)=ANY=[]) 02:41:58 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:41:58 executing program 2: sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x40, r0, 0x100, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x4}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}], @NL80211_ATTR_PRIVACY={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x98) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x38, r1, 0x400, 0x70bd2c, 0x0, {{}, {@val={0x8}, @void, @val={0xc, 0x99, {0x80}}}}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x38}}, 0x800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000b40), 0x2, 0x0) 02:41:59 executing program 4: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_sigsuspend(&(0x7f0000000000), 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xb) ptrace$cont(0x420a, r0, 0x8, 0xc04a01) [ 942.815124][T23428] vxfs: WRONG superblock magic 00000000 at 1 02:41:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffe, &(0x7f0000000540)=ANY=[]) [ 942.931040][T23428] vxfs: WRONG superblock magic 00000000 at 8 [ 942.937157][T23428] vxfs: can't find superblock. 02:41:59 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_setup(0x69cb, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x1}) 02:41:59 executing program 2: socketpair(0x0, 0xa, 0x0, &(0x7f0000000740)) 02:41:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c00, &(0x7f0000000540)=ANY=[]) 02:41:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 02:42:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:42:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20000, &(0x7f0000000540)=ANY=[]) [ 944.158347][T23460] vxfs: WRONG superblock magic 00000000 at 1 02:42:00 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:42:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) [ 944.241586][T23460] vxfs: WRONG superblock magic 00000000 at 8 [ 944.247810][T23460] vxfs: can't find superblock. 02:42:00 executing program 2: bpf$MAP_CREATE(0x1b, 0x0, 0x0) 02:42:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c00, &(0x7f0000000540)=ANY=[]) 02:42:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x80000, &(0x7f0000000540)=ANY=[]) 02:42:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_setup(0x8, &(0x7f0000000240)=0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000980)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}]) 02:42:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f0000000300), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000740), 0x2, 0x3}}, 0x20) 02:42:01 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080), 0x800c0, 0x0) 02:42:01 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 02:42:01 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) 02:42:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x80040, &(0x7f0000000540)=ANY=[]) 02:42:02 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x448b02, 0x0) 02:42:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6000, &(0x7f0000000540)=ANY=[]) 02:42:02 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x88040000, 0x0, 0x0, 0x0, 0x0) gettid() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setattr(0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) clone(0x40002200, 0x0, &(0x7f0000001600), 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 02:42:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000500)={&(0x7f0000000440), 0xc, 0x0}, 0x0) 02:42:02 executing program 5: syz_open_dev$sndctrl(&(0x7f00000005c0), 0x0, 0x2) 02:42:02 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000), 0x5c241, 0x0) 02:42:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6800, &(0x7f0000000540)=ANY=[]) 02:42:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x400000, &(0x7f0000000540)=ANY=[]) 02:42:03 executing program 2: syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x20483) [ 947.015614][T23527] IPVS: ftp: loaded support on port[0] = 21 02:42:03 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000002ac0), 0x4) 02:42:03 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) [ 947.687933][T23533] IPVS: ftp: loaded support on port[0] = 21 [ 947.724484][T23565] vxfs: WRONG superblock magic 00000000 at 1 [ 947.732341][T23565] vxfs: WRONG superblock magic 00000000 at 8 [ 947.738521][T23565] vxfs: can't find superblock. 02:42:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 02:42:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c00, &(0x7f0000000540)=ANY=[]) 02:42:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$video(&(0x7f0000000000), 0xd, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, 0x0, 0x0) 02:42:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe0ffff, &(0x7f0000000540)=ANY=[]) 02:42:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000007c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), r1, 0x2}}, 0x18) 02:42:05 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_open_dev$sndctrl(0x0, 0xfba, 0x0) socket(0x0, 0x800, 0x0) process_vm_writev(0x0, &(0x7f00000005c0)=[{0x0}], 0x1, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f0000000940)={0x14, 0x0, 0x0}, &(0x7f0000000ac0)={0x1c, 0x0, 0x0, 0x0}) 02:42:05 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x88040000, 0x0, 0x0, 0x0, 0x0) gettid() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setattr(0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) clone(0x40002200, 0x0, &(0x7f0000001600), 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) [ 949.193122][T23622] vivid-000: kernel_thread() failed 02:42:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7400, &(0x7f0000000540)=ANY=[]) 02:42:05 executing program 3: add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 02:42:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1000000, &(0x7f0000000540)=ANY=[]) 02:42:05 executing program 5: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) [ 950.005426][T23635] IPVS: ftp: loaded support on port[0] = 21 02:42:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000000200)="b7", 0x1, 0x20000, 0x0, 0x0) [ 950.461083][T23649] vxfs: WRONG superblock magic 00000000 at 1 [ 950.495264][T23649] vxfs: WRONG superblock magic 00000000 at 8 [ 950.502279][T23649] vxfs: can't find superblock. 02:42:06 executing program 5: bpf$MAP_CREATE(0x1e, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:42:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a00, &(0x7f0000000540)=ANY=[]) 02:42:06 executing program 2: syz_io_uring_setup(0x35a9, &(0x7f0000000440), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000840), &(0x7f0000000880)) 02:42:07 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000080)=[0x0], &(0x7f00000000c0), &(0x7f0000000100), 0x0}) 02:42:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2000000, &(0x7f0000000540)=ANY=[]) 02:42:07 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x88040000, 0x0, 0x0, 0x0, 0x0) gettid() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setattr(0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) clone(0x40002200, 0x0, &(0x7f0000001600), 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 02:42:07 executing program 2: openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) 02:42:07 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_setup(0x8, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000980)=[0x0]) 02:42:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb900, &(0x7f0000000540)=ANY=[]) [ 951.679550][T23696] vxfs: WRONG superblock magic 00000000 at 1 [ 951.766755][T23696] vxfs: WRONG superblock magic 00000000 at 8 [ 951.773239][T23696] vxfs: can't find superblock. [ 951.809974][T23701] IPVS: ftp: loaded support on port[0] = 21 02:42:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) 02:42:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 02:42:08 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x88040000, 0x0, 0x0, 0x0, 0x0) gettid() wait4(0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sched_setattr(0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, 0x0) clone(0x40002200, 0x0, &(0x7f0000001600), 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 02:42:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2040000, &(0x7f0000000540)=ANY=[]) 02:42:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 02:42:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc50b, &(0x7f0000000540)=ANY=[]) 02:42:09 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000440)=0x7, 0x4) 02:42:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 953.136997][T23743] IPVS: ftp: loaded support on port[0] = 21 02:42:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2842090, &(0x7f0000000540)=ANY=[]) 02:42:09 executing program 5: syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) socketpair(0x1e, 0x0, 0xfffffbff, &(0x7f00000009c0)) 02:42:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc60b, &(0x7f0000000540)=ANY=[]) 02:42:10 executing program 2: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000340)={{0x1, 0x2, 0x0, 0x1f, 'syz1\x00', 0x1}, 0x5, 0x30000030, 0x0, 0x0, 0x2, 0x4, 'syz1\x00', &(0x7f0000000300)=['{.}]\x00', '\x00'], 0x6, '\x00', [0x8, 0x401, 0x5, 0x7]}) syz_open_dev$sndctrl(&(0x7f00000005c0), 0x0, 0x2) gettid() syz_open_dev$dri(&(0x7f0000000d40), 0x6, 0x2000) 02:42:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:42:10 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 02:42:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3000000, &(0x7f0000000540)=ANY=[]) 02:42:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x9, &(0x7f0000000600)="b1d9b08e", 0x4) 02:42:11 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000a40)) 02:42:11 executing program 2: syz_emit_ethernet(0x26, &(0x7f0000000700)={@dev, @multicast, @val={@void}, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @random="f7d794e07e25"}}}}, 0x0) 02:42:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc70b, &(0x7f0000000540)=ANY=[]) [ 955.106232][T23816] vxfs: WRONG superblock magic 00000000 at 1 [ 955.199609][T23816] vxfs: WRONG superblock magic 00000000 at 8 [ 955.205747][T23816] vxfs: can't find superblock. 02:42:11 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000080)=""/7, 0x7) 02:42:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4000000, &(0x7f0000000540)=ANY=[]) 02:42:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003b00)) 02:42:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000140)=0x3f, 0x4) 02:42:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xedc0, &(0x7f0000000540)=ANY=[]) 02:42:12 executing program 5: setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) openat$cgroup_root(0xffffff9c, 0x0, 0x200002, 0x0) openat$thread_pidfd(0xffffff9c, &(0x7f0000003a00), 0x0, 0x0) [ 956.334199][T23838] vxfs: WRONG superblock magic 00000000 at 1 [ 956.434156][T23838] vxfs: WRONG superblock magic 00000000 at 8 [ 956.442257][T23838] vxfs: can't find superblock. 02:42:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0)=0x8, 0x4) 02:42:14 executing program 3: io_setup(0x8001, &(0x7f00000000c0)) io_destroy(0x0) 02:42:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001800)) 02:42:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfeff, &(0x7f0000000540)=ANY=[]) 02:42:14 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) 02:42:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5000000, &(0x7f0000000540)=ANY=[]) [ 957.968657][T23862] vxfs: WRONG superblock magic 00000000 at 1 [ 957.975785][T23862] vxfs: WRONG superblock magic 00000000 at 8 [ 957.982229][T23862] vxfs: can't find superblock. 02:42:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 02:42:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff00, &(0x7f0000000540)=ANY=[]) 02:42:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6000000, &(0x7f0000000540)=ANY=[]) 02:42:14 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mq_getsetattr(r0, 0x0, 0x0) 02:42:14 executing program 2: openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x802, 0x0) openat$pfkey(0xffffff9c, &(0x7f00000000c0), 0x1, 0x0) 02:42:14 executing program 5: syz_emit_ethernet(0xfc0, &(0x7f0000000400)={@dev, @multicast, @val={@void}, {@x25={0x805, {0x0, 0x0, 0x0, "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"}}}}, 0x0) [ 958.991636][T23886] vxfs: WRONG superblock magic 00000000 at 1 [ 959.044976][T23886] vxfs: WRONG superblock magic 00000000 at 8 [ 959.051413][T23886] vxfs: can't find superblock. 02:42:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x40) 02:42:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000004e80)={0x0, 0x0, &(0x7f0000004e40)={&(0x7f0000000400)=ANY=[@ANYBLOB="1032"], 0x14}}, 0x0) 02:42:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@newpolicy={0xd0, 0x13, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@private}}]}, 0xd0}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:42:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6040000, &(0x7f0000000540)=ANY=[]) 02:42:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff0f, &(0x7f0000000540)=ANY=[]) 02:42:15 executing program 5: r0 = socket(0x26, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 02:42:16 executing program 3: mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 02:42:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c) 02:42:16 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast1}}}}}, 0x0) 02:42:16 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1f) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) 02:42:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7000000, &(0x7f0000000540)=ANY=[]) 02:42:16 executing program 2: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 02:42:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffe, &(0x7f0000000540)=ANY=[]) 02:42:17 executing program 3: r0 = mq_open(&(0x7f0000000000)=')^[!^,}+g)\x00', 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) 02:42:17 executing program 4: r0 = openat$pfkey(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) [ 961.292742][T23936] vxfs: WRONG superblock magic 00000000 at 1 [ 961.359546][T23936] vxfs: WRONG superblock magic 00000000 at 8 [ 961.365720][T23936] vxfs: can't find superblock. 02:42:17 executing program 5: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000840), 0x208979e2880c4240) 02:42:17 executing program 2: clone(0x2200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000140)='\x97&\x89\\\xd0\xe7\xca\xc7ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2W\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\t\x00\x00\x00}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8b\x9eVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \xf8{^\xd6\xcc\x10\xc1\xb3\x9f\xb8IbR:/q~\xad}\xa1^\xa7\xcd\xe2\xb9\x86\x89\x8e\xf0>\x12\x13\xf5\xe9ho{pI\xac\xbe\x9dBF\xd4\b8\xdd\xf0D\xd21S%\xf7\xf7 G\xc4\'cH\xa8\xcf/\xad\x1d\xbbn\xa6\xe1t<,_\xbcz|0GT\n\xb4\x14\xef\x11&\xb2\xf7\x9d\x81\x9ezJ\x96\xa2\xc2\x14\x0fT\x19D\xe2v0o\x1a\xe2|\xe1\xe5\x80\xbf\x1d\x01\x004L\xea\xfd\x9b\x1e\xdcx\xd4\x16\x17\xb7\x04S\xd8\x18\f\xb5\xe9\x1b.|\xe9\x01\x97*\xf2lty\x0e\x8c4O\xb93\xd7kR\x02\xe1\xd8\x9e\xa9\xee\xcb\xcb<*te\x05\xa4\x85\x93Re\xb0Q\xc2\x9cS\xbbI\xd7\xf0g\xc9\xa5^\xbe\x15R)\x04\x1c?x\'\x9e;\xbb\xa5\xbb\xe8\xfb\xa5\x14z\xdb\xa0<(\xf6\xc8\a~\xcb\x8e\x17+\xc2J\xb5\xffP\x8f\xd8\xcb0\xd0A\xba\x9f`\xae\xbe\x1d\x97\xe4\xf1T{\t\x1e;3\xcb\x8cG\xfb\xb5\xde\x91\\ \xd5\b\xea~\x8b;\xbb\"K\a\xa60\x03\xe5\xcb\xa4/3\xef\xa6\xba\xf8F\x14\x90\x84\xd8>\xd6R\xa7)\x17x>\xee\xcc\xd0\x1f~l\x0fr', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000780)='\x00', 0x0, 0x0, 0x1000) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) write$apparmor_exec(r1, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:42:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20000, &(0x7f0000000540)=ANY=[]) 02:42:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8000000, &(0x7f0000000540)=ANY=[]) 02:42:18 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1f) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, 0x0) 02:42:18 executing program 4: io_setup(0x6, &(0x7f0000000000)) io_setup(0x6, &(0x7f00000003c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) io_destroy(r0) 02:42:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 02:42:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x80000, &(0x7f0000000540)=ANY=[]) [ 962.515714][T23967] vxfs: WRONG superblock magic 00000000 at 1 02:42:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x34, 0xa, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}]}]}, 0x34}}, 0x0) [ 962.615847][T23967] vxfs: WRONG superblock magic 00000000 at 8 [ 962.622271][T23967] vxfs: can't find superblock. 02:42:19 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) 02:42:19 executing program 2: timer_create(0xce200f2aa1471d7e, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x0) 02:42:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x9000000, &(0x7f0000000540)=ANY=[]) 02:42:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x2}]}) 02:42:19 executing program 4: mq_open(&(0x7f0000000000)='\'\xe4+\x1f-]\x00', 0x8c1, 0x0, 0x0) 02:42:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x80040, &(0x7f0000000540)=ANY=[]) [ 963.696931][T23998] vxfs: WRONG superblock magic 00000000 at 1 02:42:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 02:42:20 executing program 3: r0 = mq_open(&(0x7f0000000000)=')^[!^,}+g)\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) [ 963.801827][T23998] vxfs: WRONG superblock magic 00000000 at 8 [ 963.808069][T23998] vxfs: can't find superblock. 02:42:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa000000, &(0x7f0000000540)=ANY=[]) 02:42:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000001c0)=0x5, 0x4) 02:42:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) 02:42:20 executing program 3: openat$thread_pidfd(0xffffff9c, &(0x7f0000001840), 0x4000, 0x0) 02:42:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x400000, &(0x7f0000000540)=ANY=[]) 02:42:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000003c0)="d2", 0x1) 02:42:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) [ 964.882488][T24021] vxfs: WRONG superblock magic 00000000 at 1 02:42:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 964.993160][T24021] vxfs: WRONG superblock magic 00000000 at 8 [ 964.999474][T24021] vxfs: can't find superblock. [ 965.318767][T24031] vxfs: WRONG superblock magic 00000000 at 1 02:42:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb000000, &(0x7f0000000540)=ANY=[]) [ 965.409645][T24031] vxfs: WRONG superblock magic 00000000 at 8 [ 965.416130][T24031] vxfs: can't find superblock. 02:42:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x44, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7e05, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}, {}], {}, [{0x8, 0x1}, {}, {}, {}, {}]}, 0x5c, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x8) 02:42:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x879}, 0x1c) 02:42:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe0ffff, &(0x7f0000000540)=ANY=[]) 02:42:22 executing program 2: mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) 02:42:22 executing program 4: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@hat={'permhat ', 0x1}, 0x1b) [ 966.156384][T24046] vxfs: WRONG superblock magic 00000000 at 1 [ 966.228818][T24046] vxfs: WRONG superblock magic 00000000 at 8 [ 966.235421][T24046] vxfs: can't find superblock. 02:42:22 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) 02:42:22 executing program 5: capset(&(0x7f0000004f00)={0x20071026}, &(0x7f0000004f40)) [ 966.563321][ T34] audit: type=1400 audit(1620700942.890:386): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=24057 comm="syz-executor.4" 02:42:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc000000, &(0x7f0000000540)=ANY=[]) [ 966.782583][T24067] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 02:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000), &(0x7f0000000080)=0x44) 02:42:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1000000, &(0x7f0000000540)=ANY=[]) 02:42:23 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000640)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) 02:42:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20004005) 02:42:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 967.280617][T24071] vxfs: WRONG superblock magic 00000000 at 1 [ 967.328019][T24071] vxfs: WRONG superblock magic 00000000 at 8 [ 967.334485][T24071] vxfs: can't find superblock. 02:42:24 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @random="f2c938677653", @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @broadcast, @local}}}}, 0x0) 02:42:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd000000, &(0x7f0000000540)=ANY=[]) [ 967.824531][T24084] vxfs: WRONG superblock magic 00000000 at 1 [ 967.880217][T24084] vxfs: WRONG superblock magic 00000000 at 8 [ 967.886449][T24084] vxfs: can't find superblock. 02:42:24 executing program 5: syz_emit_ethernet(0xfa, &(0x7f0000000440)={@multicast, @link_local, @void, {@ipv4={0x800, @gre={{0x2a, 0x4, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x53, 0x0, [{0x0, 0x2}, {0x0, 0xd, "d522ed607f67d52e1e158c"}, {0x0, 0x12, "85cec4f0efce58305f13534538f36c78"}, {0x0, 0xd, "4640a56b786a00ddbbb819"}, {0x0, 0x8, "38aa837c8424"}, {0x0, 0x11, "bdcf0263ea790d250e5652825ce68c"}, {0x0, 0x6, "d102aac9"}]}, @ssrr={0x89, 0x17, 0x0, [@multicast2, @dev, @dev, @broadcast, @private]}, @lsrr={0x83, 0x27, 0x0, [@dev, @private, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, @loopback, @multicast2, @local, @broadcast]}]}}}}}}, 0x0) 02:42:24 executing program 4: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 02:42:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1000001, &(0x7f0000000540)=ANY=[]) 02:42:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)={0x0, 0x989680}) [ 968.514152][T24098] vxfs: WRONG superblock magic 00000000 at 1 [ 968.566618][T24098] vxfs: WRONG superblock magic 00000000 at 8 [ 968.573310][T24098] vxfs: can't find superblock. 02:42:25 executing program 5: keyctl$set_reqkey_keyring(0xe, 0xc) 02:42:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe000000, &(0x7f0000000540)=ANY=[]) 02:42:25 executing program 4: r0 = add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a5", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r0) 02:42:25 executing program 2: timer_delete(0x0) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) openat$ptmx(0xffffff9c, &(0x7f0000000100), 0x105000, 0x0) 02:42:25 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) [ 969.261220][T24115] vxfs: WRONG superblock magic 00000000 at 1 [ 969.357060][T24115] vxfs: WRONG superblock magic 00000000 at 8 [ 969.363628][T24115] vxfs: can't find superblock. 02:42:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000000)="47ff027e42cfc5b5ef2727a33f9da7383e", 0xffffffffffffff6b) [ 969.607339][T24124] vxfs: WRONG superblock magic 00000000 at 1 [ 969.662700][T24124] vxfs: WRONG superblock magic 00000000 at 8 [ 969.669209][T24124] vxfs: can't find superblock. 02:42:26 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000007e00), 0xffffffffffffffff) 02:42:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1000002, &(0x7f0000000540)=ANY=[]) 02:42:26 executing program 5: openat$ptmx(0xffffff9c, &(0x7f0000000100), 0x105000, 0x0) 02:42:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0xb, 0x6, 0x3}, 0x14}}, 0x0) 02:42:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf000000, &(0x7f0000000540)=ANY=[]) 02:42:26 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) [ 970.378094][T24141] vxfs: WRONG superblock magic 00000000 at 1 02:42:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0xe9c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0xe98, 0x4, 0x0, 0x1, [{0x318, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x65, 0x1, "26a3f58a9b5793d8daf93128949ef4511d689f7a5a515b0c17de7a109c67c4b1c2c5efdab3d40aa4da4d4268ff34777f13c407f0746c6eb45ad9082a131a71c9f23739dea7b54ca8dcbaf567be2406a23366727fc433b264e779dd369f69eb557f"}, @NL80211_PKTPAT_PATTERN={0xe1, 0x2, "90f56ee70236a7f710a77c918d52a5d4e38bca32402661fdfd87a4d349313550649fcbc0d447ca7611bd36e060fe5c46dba3895fa88cba2cb4a8f3f0fc411735bcab716ec77089cf3e6834fa8198106bff093b780ec895117cb84b3abf78486ce9e402a0d755c669bae4221c354e37119504a9f35390f42cdd316417535e47eea8406ade366533724912ecd0a62819328609b2b4619d37326a2d84e9603e00caac1178922682f5807663f81e02b45f7ee7aed58fd2e8441c1bdce5eb3bfdaa1b1de7ef79710efd7e207fb98e92871e03132e68e5f671dfc8d66bc52d67"}, @NL80211_PKTPAT_MASK={0xe1, 0x1, "73af250e9d27efcfff6b0729d986d2f4fdb52007e75541ce4a68663abbed8d105cc7e427fc3129d29f9f9ae7144ce0df0aa7fbdbaa6c2fcbcfdb7782afabed203c015ece0faa64ff358d024eb754d06d7007454214a08d91452595ce8d64b9cde8b441bdf4eb549a791dd284412b5f48f4cc606d83cf90eceef8d111a6cfb9d21c57f4f1e368bd1ed0fc819c0a6d0c400cfe0c61d7fd59d1b6ca4076f2ed8c8615c1cc74a24859af3bc6bce06776a2463081f80f97c25ad367fb3b4e55ddfe32f45d8ee455a3dc71eeec9175ed3a3c445f42964814c0a6f17dcf462d82"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0xa9, 0x1, "1f2cf0c5a8c157eed94977a71b70441ec2eb900d10404e3cc4139cbc6730f7799313fb9453d7d5c80428c24763d845015a021b71e94fd288a662af922a568044b5cc89f4d50d8aaa16d7e5fddc447ae82a7c4c15578abac0e29be19b3a8436508bd9be089206f39607ed51194bde6abd431f12f474133babb59364c144a90d0eacc30322b93e33a916a503632059fb6279af12617f9cc37014ff611e3e94ccb49d7101f9f9"}, @NL80211_PKTPAT_PATTERN={0x9, 0x2, "50054ce53c"}, @NL80211_PKTPAT_MASK={0x21, 0x1, "0ddeb9cf12101b1a7b4c3512d0ed801d953855f152fb798bd8e469b7ba"}]}, {0xb7c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x95, 0x1, "560cfb896f0a9ca0de9ce936587b5aefda139a25ab502c37dcdb40b4e1db322c789aa491cea9159dd40901199affe68a0a262adc34a001c51a1dd035a2cb2775a0f1aa4872b96949fcfcfb67faa38a0ca5221649574c2cfc47c5fbc2562db03091ed592d6bee648b4deb90d4719e2ca545fb02d38cab29d0667785fb488d17926142863653912ca7c848526b8e957cc2b8"}, @NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_MASK={0x11, 0x1, "a9941a2301f662ae2aaae4c8fc"}, @NL80211_PKTPAT_PATTERN={0xac1, 0x2, "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"}]}]}]}]}, 0xec4}}, 0x0) [ 970.449887][T24141] vxfs: WRONG superblock magic 00000000 at 8 [ 970.456248][T24141] vxfs: can't find superblock. [ 970.820340][T24149] vxfs: WRONG superblock magic 00000000 at 1 [ 970.908212][T24149] vxfs: WRONG superblock magic 00000000 at 8 [ 970.914691][T24149] vxfs: can't find superblock. 02:42:27 executing program 3: io_setup(0x3000000, &(0x7f0000000040)) 02:42:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[{0xc}], 0xc}, 0x0) 02:42:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2000000, &(0x7f0000000540)=ANY=[]) 02:42:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000004e80)={0x0, 0x0, &(0x7f0000004e40)={&(0x7f0000000400)=ANY=[], 0x14}}, 0x0) 02:42:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x10000000, &(0x7f0000000540)=ANY=[]) 02:42:27 executing program 4: openat$pfkey(0xffffff9c, &(0x7f0000000140), 0x200000, 0x0) 02:42:27 executing program 3: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) 02:42:28 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="580000000906010069a7000000862200000000001300030068617368586e65742c6966616365000005000400000d00000900020073797a30000000000c000780080006400000000405000500020000000500010006"], 0x58}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffad) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 971.790327][T24167] vxfs: WRONG superblock magic 00000000 at 1 [ 971.858360][T24167] vxfs: WRONG superblock magic 00000000 at 8 [ 971.864817][T24167] vxfs: can't find superblock. [ 971.997646][T24175] vxfs: WRONG superblock magic 00000000 at 1 [ 972.007329][T24175] vxfs: WRONG superblock magic 00000000 at 8 [ 972.013715][T24175] vxfs: can't find superblock. 02:42:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 02:42:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2000001, &(0x7f0000000540)=ANY=[]) 02:42:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x11000000, &(0x7f0000000540)=ANY=[]) 02:42:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040), 0x10) 02:42:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32, @ANYBLOB="00000000000000000c0000000a0001006261736963"], 0x3c}}, 0x0) 02:42:29 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_batadv\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='#']}) 02:42:29 executing program 5: io_setup(0x6, &(0x7f00000003c0)) io_setup(0x48, &(0x7f0000000000)) io_setup(0x8001, &(0x7f00000000c0)) io_setup(0xa3, &(0x7f0000000040)) io_setup(0x7, &(0x7f0000000080)) [ 972.819865][T24193] vxfs: WRONG superblock magic 00000000 at 1 [ 972.854086][T24193] vxfs: WRONG superblock magic 00000000 at 8 [ 972.860704][T24193] vxfs: can't find superblock. [ 973.056409][T24200] vxfs: WRONG superblock magic 00000000 at 1 [ 973.063540][T24200] vxfs: WRONG superblock magic 00000000 at 8 [ 973.069918][T24200] vxfs: can't find superblock. [ 973.160147][T24209] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 02:42:29 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 02:42:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2040000, &(0x7f0000000540)=ANY=[]) 02:42:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x12000000, &(0x7f0000000540)=ANY=[]) 02:42:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) ioprio_get$pid(0x1, 0x0) 02:42:30 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 02:42:30 executing program 5: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080), 0x0) 02:42:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$sock(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="ce4a44f686b6e74b9c7cb623c39f063874a9542d931d9f25764355c17547c3940c45158f70ebd8886264a349cc768910a9d77806be8c559ff5aecac33039c2cec33e367b68a817a042fbb9b6256562dab0bf2e0be2b710ebafa436477a0295bead82e76d949cd99a546a000084a011bfe3f29bb9accb1c35ebf97e93d19656724295f5a5ac2387e69d9520f1d53c6fe499d14c36a5ceb5df4f3b35aad70e5ff65e8f86e28602c46a4917bc209dbeca2cdd2d88eb020411bcfdc5ba91", 0xac}, {&(0x7f00000000c0)="a1f3bb96198eefbdef736a9c68dc9912e9b58f8b1cec652ebdd0ff6d65972c429230232e180c8638fa852484116171cdf353cca0794236dd460bf3c58055fc69ecfb5a3683035d008a6af633c87cde28efdbf72c3a946b9f7d41412b0912ab330ffd0e60118f1f0911855a9d73cd3f2e13f52c", 0x73}, {&(0x7f0000000000)="ecbf5d02e6d2aad99ac2c04370b2614a8dfcfd9ea98f9143299c3d1ee97ed55697d6208ecf1cd12d780a37b36c9c8731fad5f0091b95ecf9781df3c77fcc8f7425ab6b8b30b048528fd232b61497fbf3888af4912c7b843509662334461a1fe8a22b7c8d91f6d7c6cb86d664569121ff650f715a6de33ac2df46eb7cd68150a0ba3198ec7300af7cd896aace01c33e117946873435ec7ad83855c64e711a96371557b0e284542d5e9a9ec2dceb01e22eda6b8c6f7f889e6f0d366e58bbab", 0xbe}], 0xa, 0x0, 0x34}, 0x4000010) [ 974.297708][T24230] vxfs: WRONG superblock magic 00000000 at 1 02:42:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2204080, &(0x7f0000000540)=ANY=[]) [ 974.357039][T24230] vxfs: WRONG superblock magic 00000000 at 8 [ 974.363557][T24230] vxfs: can't find superblock. 02:42:30 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000040)={'veth1_to_batadv\x00', @ifru_addrs=@l2}) 02:42:30 executing program 2: syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000400)='.\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)={[{@fat=@nocase}]}) 02:42:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20000000, &(0x7f0000000540)=ANY=[]) 02:42:31 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, 0x0, &(0x7f0000000040)) [ 974.993246][T24243] vxfs: WRONG superblock magic 00000000 at 1 [ 975.003355][T24243] vxfs: WRONG superblock magic 00000000 at 8 [ 975.009712][T24243] vxfs: can't find superblock. 02:42:31 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x20000000000002da, &(0x7f0000000040)=[{}]}) [ 975.211925][T24245] FAT-fs (loop2): bogus number of reserved sectors [ 975.219064][T24245] FAT-fs (loop2): Can't find a valid FAT filesystem 02:42:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3000000, &(0x7f0000000540)=ANY=[]) [ 975.374501][T24245] FAT-fs (loop2): bogus number of reserved sectors [ 975.381402][T24245] FAT-fs (loop2): Can't find a valid FAT filesystem 02:42:31 executing program 3: syz_mount_image$vfat(&(0x7f0000001180), &(0x7f00000011c0)='./file0\x00', 0x80000001, 0x1, &(0x7f0000001500)=[{&(0x7f0000001400)="648ad497b10300ff", 0x8, 0x7}], 0x0, &(0x7f0000001580)) 02:42:32 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_batadv\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='\a']}) 02:42:32 executing program 5: syz_emit_ethernet(0x6e, &(0x7f0000000200)={@link_local, @random="9233854b9c83", @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @multicast1, {[@timestamp={0x44, 0x4}, @lsrr={0x83, 0x3}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}, 0x0) [ 975.692572][T24260] vxfs: WRONG superblock magic 00000000 at 1 [ 975.704154][T24260] vxfs: WRONG superblock magic 00000000 at 8 [ 975.710417][T24260] vxfs: can't find superblock. [ 975.738141][T24262] vxfs: WRONG superblock magic 00000000 at 1 [ 975.748032][T24262] vxfs: WRONG superblock magic 00000000 at 8 [ 975.754535][T24262] vxfs: can't find superblock. 02:42:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20100000, &(0x7f0000000540)=ANY=[]) 02:42:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$sock(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 02:42:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x30c0000, &(0x7f0000000540)=ANY=[]) [ 976.198362][T24275] loop3: detected capacity change from 0 to 264192 [ 976.308088][T24275] FAT-fs (loop3): bogus number of FAT structure [ 976.314750][T24275] FAT-fs (loop3): Can't find a valid FAT filesystem [ 976.481602][T24275] loop3: detected capacity change from 0 to 264192 [ 976.509202][T24275] FAT-fs (loop3): bogus number of FAT structure [ 976.515659][T24275] FAT-fs (loop3): Can't find a valid FAT filesystem 02:42:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) add_key$keyring(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 02:42:33 executing program 2: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) close(r0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x6800) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 02:42:33 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000001800)={&(0x7f00000015c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000001780)=[@flowinfo={{0x14}}], 0x18}, 0x0) 02:42:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x240c0000, &(0x7f0000000540)=ANY=[]) 02:42:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) futimesat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000001940)={{0x0, 0xea60}, {0x0, 0x2710}}) 02:42:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4000000, &(0x7f0000000540)=ANY=[]) 02:42:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) add_key$keyring(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 02:42:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000078c0)=[{{0x0, 0x0, 0x0, 0xfffffffffffffe5c}}], 0x1, 0x0) 02:42:34 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000500)={'bond0\x00', @ifru_map}) [ 977.975361][T24321] vxfs: WRONG superblock magic 00000000 at 1 [ 977.984662][T24321] vxfs: WRONG superblock magic 00000000 at 8 [ 977.991225][T24321] vxfs: can't find superblock. 02:42:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x7, 0x80, 0x7de7}]}) 02:42:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x25000000, &(0x7f0000000540)=ANY=[]) 02:42:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5000000, &(0x7f0000000540)=ANY=[]) 02:42:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) add_key$keyring(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 02:42:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x0, 0x0, "63d23fa3d0f8dce0"}) 02:42:35 executing program 2: ustat(0x3, 0x0) [ 978.740922][ T34] audit: type=1326 audit(1620700955.070:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24335 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 [ 978.795012][T24336] vxfs: WRONG superblock magic 00000000 at 1 [ 978.847187][T24336] vxfs: WRONG superblock magic 00000000 at 8 [ 978.853647][T24336] vxfs: can't find superblock. 02:42:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x250c0000, &(0x7f0000000540)=ANY=[]) [ 979.074351][T24343] vxfs: WRONG superblock magic 00000000 at 1 [ 979.139250][T24343] vxfs: WRONG superblock magic 00000000 at 8 [ 979.139323][T24343] vxfs: can't find superblock. 02:42:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6000000, &(0x7f0000000540)=ANY=[]) 02:42:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9, 0x1, 0x4, 0x0, 0x0, 0x46cb, 0x1, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000140)}, 0x6a0, 0x0, 0x81, 0x1, 0x6, 0x8, 0xda31, 0x0, 0x8000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) write$input_event(0xffffffffffffffff, &(0x7f0000000000)={{0x77359400}}, 0xfe4f) 02:42:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) add_key$keyring(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) [ 979.573992][ T34] audit: type=1326 audit(1620700955.900:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24335 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7fb8549 code=0x0 02:42:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001240)) 02:42:36 executing program 4: syz_emit_ethernet(0xffffffffffffff63, &(0x7f0000000080)={@local, @multicast, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @random="7ccaacbbac37", @remote, @remote, @mcast1}}}}, 0x0) 02:42:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x260c0000, &(0x7f0000000540)=ANY=[]) [ 980.353030][T24374] vxfs: WRONG superblock magic 00000000 at 1 02:42:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) select(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x8}, 0x0) [ 980.418513][T24374] vxfs: WRONG superblock magic 00000000 at 8 [ 980.426204][T24374] vxfs: can't find superblock. 02:42:37 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf) 02:42:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:42:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) dup2(r1, r0) 02:42:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6040000, &(0x7f0000000540)=ANY=[]) 02:42:37 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000100)) 02:42:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f000000, &(0x7f0000000540)=ANY=[]) 02:42:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xbc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) setxattr$security_capability(&(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) 02:42:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f00000016c0)=[{0xfffffffffffffffe}], 0x0, 0x0) 02:42:38 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff9) [ 981.892200][T24410] vxfs: WRONG superblock magic 00000000 at 1 [ 981.970142][T24410] vxfs: WRONG superblock magic 00000000 at 8 [ 981.976498][T24410] vxfs: can't find superblock. 02:42:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7000000, &(0x7f0000000540)=ANY=[]) 02:42:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/udp6\x00') sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000440)="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", 0x1000}], 0x1, &(0x7f0000000280)=[{0xf8, 0x113, 0x100, "f2ab401e440756fc543387def26e9a95a2bfd182330e8b7866cfce0a4f847c000a616b86bc18c67ede88ae322913c901201bd868484247e579de7ddc6464185406ec494ef896bac1aa006adcd9fb31cad9b8f506b54e718d4b390414865b7cce5f42e590130e7be6afad7f47b8bd58e148c505ea823ea8313f694c11115994356a79962f1c0079da750b9517fb2135fe60bd2a8930137968ede946fde87d6cb8756ed792072aefc38fb52384da69611d51394acc11f7eae20260ec3f42c9f78ee18c19083f949e7a32f240f39375b7f71a7f335ac9e58d7a8a36fd6c6ce36cae28066b928f76fb80"}], 0xf8}}], 0x1, 0x2000c008) sendfile(r0, r1, 0x0, 0xedc0) 02:42:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3f000000, &(0x7f0000000540)=ANY=[]) [ 982.526628][T24430] vxfs: WRONG superblock magic 00000000 at 1 [ 982.535620][T24430] vxfs: WRONG superblock magic 00000000 at 8 [ 982.542206][T24430] vxfs: can't find superblock. 02:42:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x40000000, &(0x7f0000000540)=ANY=[]) 02:42:39 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @multicast, @val={@void, {0x8100, 0x0, 0x1}}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @random="7ccaacbbac37", @remote, @remote, @mcast1}}}}, 0x0) 02:42:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, 0xee01}}, {@mpol={'mpol', 0x3d, {'local', '', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x0]}}]}) [ 982.776548][T24436] vxfs: WRONG superblock magic 00000000 at 1 02:42:39 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge0\x00', &(0x7f0000000040)=@ethtool_perm_addr={0x20, 0x6, "325a765301c3"}}) [ 982.890356][T24436] vxfs: WRONG superblock magic 00000000 at 8 [ 982.896649][T24436] vxfs: can't find superblock. 02:42:39 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 983.215772][T24446] vxfs: WRONG superblock magic 00000000 at 1 [ 983.254569][T24446] vxfs: WRONG superblock magic 00000000 at 8 [ 983.260983][T24446] vxfs: can't find superblock. 02:42:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8000000, &(0x7f0000000540)=ANY=[]) [ 983.324505][T24452] tmpfs: Bad value for 'nr_inodes' [ 983.441409][T24452] tmpfs: Bad value for 'nr_inodes' 02:42:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x40000800, &(0x7f0000000540)=ANY=[]) 02:42:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)={0x14, 0x0, 0xa04}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000040)=""/88, 0x58}], 0x1, &(0x7f0000000800)=""/50, 0x32}, 0x40000022) 02:42:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) dup3(r1, r0, 0x0) 02:42:40 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000040)={'rose0\x00', @ifru_addrs=@l2}) [ 983.972867][T24461] vxfs: WRONG superblock magic 00000000 at 1 [ 984.080916][T24461] vxfs: WRONG superblock magic 00000000 at 8 [ 984.087157][T24461] vxfs: can't find superblock. 02:42:40 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "47173a06ad78f2c323b89e334c8ce9ee95ed4a1e83aa165908d47434a226f84149b4721c92a0c5c90452b76a9e2148600fddf1025ace426ebecb6f339e4f3a36"}, 0x48, 0xfffffffffffffffd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r2, 0x0) keyctl$chown(0x4, r0, 0x0, 0xee01) [ 984.346923][T24469] vxfs: WRONG superblock magic 00000000 at 1 [ 984.357046][T24469] vxfs: WRONG superblock magic 00000000 at 8 [ 984.363433][T24469] vxfs: can't find superblock. 02:42:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x9000000, &(0x7f0000000540)=ANY=[]) 02:42:41 executing program 4: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x1f8, 0x8}], 0x0, &(0x7f0000000000)) 02:42:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000800), 0xc, &(0x7f00000008c0)={0x0, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x11) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) signalfd4(r1, &(0x7f0000005140), 0x8, 0x800) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x2d}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 02:42:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x46030000, &(0x7f0000000540)=ANY=[]) 02:42:41 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1e, 0x0, 0x760b2d50}) [ 985.047591][T24486] vxfs: WRONG superblock magic 00000000 at 1 [ 985.087673][T24492] loop4: detected capacity change from 0 to 1 02:42:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x760b2d50}) [ 985.108400][T24486] vxfs: WRONG superblock magic 00000000 at 8 [ 985.114880][T24486] vxfs: can't find superblock. [ 985.247035][T24492] FAT-fs (loop4): invalid media value (0x89) [ 985.253722][T24492] FAT-fs (loop4): Can't find a valid FAT filesystem 02:42:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@ieee802154, 0x80, 0x0}}], 0x2, 0x0) [ 985.435469][T24492] loop4: detected capacity change from 0 to 1 02:42:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa000000, &(0x7f0000000540)=ANY=[]) 02:42:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x8810, &(0x7f0000000340)) 02:42:42 executing program 2: mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 02:42:42 executing program 4: mremap(&(0x7f0000d85000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f00006a4000/0x2000)=nil) 02:42:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x48000000, &(0x7f0000000540)=ANY=[]) 02:42:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001c40)={&(0x7f0000000540)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001b00)=[@hoplimit={{0x14}}, @dontfrag={{0x14}}], 0x30}, 0x24004804) [ 986.132714][T24520] vxfs: WRONG superblock magic 00000000 at 1 [ 986.219167][T24520] vxfs: WRONG superblock magic 00000000 at 8 [ 986.225293][T24520] vxfs: can't find superblock. 02:42:42 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x224880, 0x0) 02:42:42 executing program 5: timer_create(0x7, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) 02:42:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb000000, &(0x7f0000000540)=ANY=[]) [ 986.783568][T24537] vxfs: WRONG superblock magic 00000000 at 1 02:42:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000003580)={0x17, 0x1, &(0x7f0000003540)="f4"}) [ 986.824507][T24537] vxfs: WRONG superblock magic 00000000 at 8 [ 986.831041][T24537] vxfs: can't find superblock. 02:42:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:42:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c000000, &(0x7f0000000540)=ANY=[]) [ 987.232438][T24549] vxfs: WRONG superblock magic 00000000 at 1 02:42:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x10}}, 0x1c) [ 987.282396][T24549] vxfs: WRONG superblock magic 00000000 at 8 [ 987.290290][T24549] vxfs: can't find superblock. 02:42:43 executing program 5: r0 = fork() r1 = fork() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000240)={0x0, 0x0, 0xffffff7f}) 02:42:43 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f00000002c0), 0x80080, 0x0) 02:42:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc000000, &(0x7f0000000540)=ANY=[]) [ 987.672639][T24555] vxfs: WRONG superblock magic 00000000 at 1 [ 987.739662][T24555] vxfs: WRONG superblock magic 00000000 at 8 [ 987.745760][T24555] vxfs: can't find superblock. 02:42:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x600048c0, &(0x7f0000000080)={0xa, 0xfffd, 0x0, @remote, 0x7}, 0x1c) getpeername$inet6(r0, 0x0, 0x0) 02:42:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c000000, &(0x7f0000000540)=ANY=[]) [ 988.227657][T24570] vxfs: WRONG superblock magic 00000000 at 1 [ 988.234853][T24570] vxfs: WRONG superblock magic 00000000 at 8 [ 988.241411][T24570] vxfs: can't find superblock. 02:42:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 02:42:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000004c0)={'batadv_slave_0\x00', &(0x7f00000003c0)=@ethtool_regs}) 02:42:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xd000000, &(0x7f0000000540)=ANY=[]) [ 988.858336][T24586] vxfs: WRONG superblock magic 00000000 at 1 02:42:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 988.973974][T24586] vxfs: WRONG superblock magic 00000000 at 8 [ 988.980645][T24586] vxfs: can't find superblock. 02:42:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001c40)={&(0x7f0000000540)={0xa, 0x4e22, 0x0, @loopback, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000001b00)=[@hoplimit={{0x14}}, @dontfrag={{0x14}}], 0x30}, 0x24004804) 02:42:45 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000001800)={&(0x7f00000015c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000001600)="4af255", 0x3}], 0x1, &(0x7f0000001780)=[@hopopts={{0x18}}], 0x18}, 0x0) [ 989.411993][T24598] vxfs: WRONG superblock magic 00000000 at 1 02:42:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x60000000, &(0x7f0000000540)=ANY=[]) [ 989.529465][T24598] vxfs: WRONG superblock magic 00000000 at 8 [ 989.535719][T24598] vxfs: can't find superblock. 02:42:45 executing program 2: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x57, 0x200000000010ffd}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 02:42:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x600048c0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0xffffffff}, 0x1c) 02:42:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xe000000, &(0x7f0000000540)=ANY=[]) 02:42:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001c40)={&(0x7f0000000540)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001b00)=[@dontfrag={{0x14}}], 0x18}, 0x0) [ 990.374146][T24614] loop2: detected capacity change from 0 to 271 [ 990.490430][T24613] vxfs: WRONG superblock magic 00000000 at 1 [ 990.570141][T24614] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 990.607812][T24613] vxfs: WRONG superblock magic 00000000 at 8 [ 990.614356][T24613] vxfs: can't find superblock. 02:42:47 executing program 3: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) mlock2(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 990.742161][T24622] vxfs: WRONG superblock magic 00000000 at 1 [ 990.749871][T24622] vxfs: WRONG superblock magic 00000000 at 8 [ 990.755969][T24622] vxfs: can't find superblock. 02:42:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf000000, &(0x7f0000000540)=ANY=[]) 02:42:47 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@caif=@util={0x25, "4ed994e558968781dd67164b434175c5"}, 0x80) 02:42:47 executing program 4: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) 02:42:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x68000000, &(0x7f0000000540)=ANY=[]) 02:42:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x60008094, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, 0x1c) 02:42:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000003580)={0x17, 0x0, 0x0}) [ 991.778377][T24639] vxfs: WRONG superblock magic 00000000 at 1 [ 991.878506][T24639] vxfs: WRONG superblock magic 00000000 at 8 [ 991.885015][T24639] vxfs: can't find superblock. 02:42:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001800)={0x3, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) 02:42:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, 0x0) [ 992.176708][T24648] vxfs: WRONG superblock magic 00000000 at 1 [ 992.290268][T24648] vxfs: WRONG superblock magic 00000000 at 8 [ 992.296493][T24648] vxfs: can't find superblock. 02:42:48 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=@ethtool_sset_info}) 02:42:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x10000000, &(0x7f0000000540)=ANY=[]) 02:42:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c000000, &(0x7f0000000540)=ANY=[]) 02:42:49 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_addrs=@l2}) 02:42:49 executing program 2: pipe2$9p(0x0, 0x184800) 02:42:49 executing program 4: madvise(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x3) [ 993.270078][T24665] vxfs: WRONG superblock magic 00000000 at 1 [ 993.293504][T24665] vxfs: WRONG superblock magic 00000000 at 8 [ 993.299844][T24665] vxfs: can't find superblock. 02:42:49 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0xfc67, 0x0) [ 993.583996][T24672] vxfs: WRONG superblock magic 00000000 at 1 [ 993.673673][T24672] vxfs: WRONG superblock magic 00000000 at 8 [ 993.680213][T24672] vxfs: can't find superblock. 02:42:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x11000000, &(0x7f0000000540)=ANY=[]) 02:42:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x74000000, &(0x7f0000000540)=ANY=[]) 02:42:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'veth1_to_batadv\x00', @ifru_flags}) 02:42:50 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x195480, 0x0) 02:42:50 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000001440)={'lo\x00', @ifru_addrs=@l2}) 02:42:50 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 994.798649][T24696] veth1_to_batadv: mtu less than device minimum [ 994.801522][T24688] vxfs: WRONG superblock magic 00000000 at 1 [ 994.839165][T24688] vxfs: WRONG superblock magic 00000000 at 8 [ 994.845256][T24688] vxfs: can't find superblock. [ 994.909439][T24697] vxfs: WRONG superblock magic 00000000 at 1 [ 994.932292][T24697] vxfs: WRONG superblock magic 00000000 at 8 [ 994.938378][T24697] vxfs: can't find superblock. 02:42:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x12000000, &(0x7f0000000540)=ANY=[]) 02:42:51 executing program 3: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/pid\x00') 02:42:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a000000, &(0x7f0000000540)=ANY=[]) 02:42:51 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000000)) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 02:42:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r0, 0x0, 0x0) 02:42:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 996.086348][T24714] vxfs: WRONG superblock magic 00000000 at 1 02:42:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x6000) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2", 0x13, 0x612}, {0x0, 0x0, 0x10e20}], 0x80, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'default'}}, {@utf8no}]}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00'}) fchmod(r2, 0x4) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x10001}}, 0x0, 0x0, 0x44, 0x0, "bf34b56d1258643d2d981de594192be7cd8cab00034a6b9e401ee123f92ba40c2fdf6b7bca5cdefb1cfcfd690928d732e25c16b946f4aee4fef1ad75fe59b99d34f4592ba52a462e2331b27f3ceb1158"}, 0xd8) openat(r1, &(0x7f0000000080)='./file2\x00', 0x40000, 0x20) [ 996.143999][T24714] vxfs: WRONG superblock magic 00000000 at 8 [ 996.150686][T24714] vxfs: can't find superblock. [ 996.264578][T24720] vxfs: WRONG superblock magic 00000000 at 1 [ 996.344094][T24720] vxfs: WRONG superblock magic 00000000 at 8 [ 996.350654][T24720] vxfs: can't find superblock. 02:42:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8cffffff, &(0x7f0000000540)=ANY=[]) 02:42:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private0}, 0x1c) 02:42:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@fat=@allow_utime}, {@fat=@nfs}]}) 02:42:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20000000, &(0x7f0000000540)=ANY=[]) [ 996.932174][T24734] loop3: detected capacity change from 0 to 270 02:42:53 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x58) 02:42:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x90208402, &(0x7f0000000540)=ANY=[]) 02:42:53 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 02:42:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000078c0)=[{{&(0x7f0000005f80)=@ethernet={0x306}, 0x80, 0x0}}], 0x1, 0x20000000) [ 997.553371][T24750] FAT-fs (loop5): bogus number of reserved sectors [ 997.560365][T24750] FAT-fs (loop5): Can't find a valid FAT filesystem 02:42:54 executing program 2: syz_emit_ethernet(0x22, &(0x7f00000002c0)={@link_local, @random="9233854b9c83", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}}, 0x0) [ 997.728550][T24750] FAT-fs (loop5): bogus number of reserved sectors [ 997.736581][T24750] FAT-fs (loop5): Can't find a valid FAT filesystem [ 997.835230][T24759] vxfs: WRONG superblock magic 00000000 at 1 [ 997.896215][T24759] vxfs: WRONG superblock magic 00000000 at 8 [ 997.902736][T24759] vxfs: can't find superblock. 02:42:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002580)={0x0, @l2tp={0x2, 0x0, @local}, @phonet, @can}) 02:42:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x20100000, &(0x7f0000000540)=ANY=[]) 02:42:55 executing program 2: ioprio_set$pid(0x3, 0x0, 0x4000) 02:42:55 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x434b01, 0x0) 02:42:55 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x97ffffff, &(0x7f0000000540)=ANY=[]) 02:42:55 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 02:42:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000600)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}, 0x0) 02:42:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x25000000, &(0x7f0000000540)=ANY=[]) 02:42:55 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setresuid(0xee00, r1, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 02:42:55 executing program 2: mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x9e5fd472a4129bfb, 0xffffffffffffffff, 0x0) 02:42:56 executing program 4: connect$rose(0xffffffffffffffff, 0x0, 0x0) 02:42:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa501fcf5, &(0x7f0000000540)=ANY=[]) 02:42:56 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='gre0\x00', @ANYRESHEX=r1]}) [ 999.869182][T24804] vxfs: WRONG superblock magic 00000000 at 1 [ 999.918467][T24804] vxfs: WRONG superblock magic 00000000 at 8 [ 999.924933][T24804] vxfs: can't find superblock. 02:42:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 02:42:56 executing program 3: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 02:42:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x2f000000, &(0x7f0000000540)=ANY=[]) 02:42:56 executing program 4: pipe(&(0x7f00000015c0)) 02:42:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xaf0b9cfd, &(0x7f0000000540)=ANY=[]) 02:42:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x2c}}, 0x0) 02:42:57 executing program 2: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xfffffffffffffffe) [ 1001.082669][ T3125] ieee802154 phy0 wpan0: encryption failed: -22 [ 1001.089328][ T3125] ieee802154 phy1 wpan1: encryption failed: -22 02:42:57 executing program 3: r0 = socket(0x22, 0x3, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 1001.205280][T24832] vxfs: WRONG superblock magic 00000000 at 1 [ 1001.269084][T24832] vxfs: WRONG superblock magic 00000000 at 8 [ 1001.275193][T24832] vxfs: can't find superblock. 02:42:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0xa}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0x0) 02:42:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x3f000000, &(0x7f0000000540)=ANY=[]) 02:42:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:42:58 executing program 5: r0 = socket(0x22, 0x3, 0x0) bind$can_raw(r0, &(0x7f0000000040), 0x10) 02:42:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0x2, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x28}}], 0x1, 0x0) 02:42:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb9000000, &(0x7f0000000540)=ANY=[]) [ 1002.207338][T24857] vxfs: WRONG superblock magic 00000000 at 1 [ 1002.259801][T24857] vxfs: WRONG superblock magic 00000000 at 8 [ 1002.266089][T24857] vxfs: can't find superblock. 02:42:58 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@hopopts={{0x18, 0x29, 0x36, {0x5c}}}], 0x18}, 0x20000000) 02:42:58 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x3a1200, 0x0) 02:42:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x40000000, &(0x7f0000000540)=ANY=[]) 02:42:59 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff}) poll(&(0x7f0000000480)=[{}, {r0}, {}], 0x3, 0xfffffffe) 02:42:59 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendmmsg$sock(r0, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20040001) 02:42:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc0ed0000, &(0x7f0000000540)=ANY=[]) 02:42:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000170a01"], 0x20}}, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 02:42:59 executing program 4: r0 = socket(0x11, 0xa, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, 0x0) [ 1003.368294][T24882] vxfs: WRONG superblock magic 00000000 at 1 02:42:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000500), r0) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) [ 1003.413163][T24882] vxfs: WRONG superblock magic 00000000 at 8 [ 1003.419600][T24882] vxfs: can't find superblock. [ 1003.500701][T24890] vxfs: WRONG superblock magic 00000000 at 1 [ 1003.507533][T24890] vxfs: WRONG superblock magic 00000000 at 8 [ 1003.513952][T24890] vxfs: can't find superblock. [ 1003.552801][T24895] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 02:43:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x40000800, &(0x7f0000000540)=ANY=[]) [ 1003.930456][T24895] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 02:43:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf5fc01a5, &(0x7f0000000540)=ANY=[]) 02:43:00 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0xf6, &(0x7f0000000080)=""/246, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, &(0x7f0000000040)="95", 0x1, 0x9c277f40c7bf5381, 0x0, 0x0) 02:43:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'vlan0\x00', {'syzkaller1\x00'}}) 02:43:00 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x28, 0x0, 0x0, "e8a35e1cd37767adc289a373aefd235fea"}, 0x28}, 0x0) [ 1004.640249][T24915] vxfs: WRONG superblock magic 00000000 at 1 [ 1004.659897][T24915] vxfs: WRONG superblock magic 00000000 at 8 [ 1004.666139][T24915] vxfs: can't find superblock. 02:43:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x46030000, &(0x7f0000000540)=ANY=[]) 02:43:01 executing program 3: syz_emit_ethernet(0xe7, &(0x7f0000000200)=ANY=[@ANYBLOB="c033e2eab5aabbbbbbbbbbbb8100290008"], 0x0) 02:43:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf6ffffff, &(0x7f0000000540)=ANY=[]) 02:43:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000240)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 02:43:01 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="5500000018007fd500fe01b2a4a280930a06020a00a843089100fe8039000800080002000f0000002d0000009b2c136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d24", 0x51}, {&(0x7f0000000080)="02044911", 0x4}], 0x2}, 0x0) 02:43:01 executing program 5: r0 = socket(0x22, 0x3, 0x0) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6, 0x12, r0, 0x0) 02:43:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) 02:43:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x48000000, &(0x7f0000000540)=ANY=[]) 02:43:02 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 02:43:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="01"], 0x1c}}, 0x0) 02:43:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf9fdffff, &(0x7f0000000540)=ANY=[]) 02:43:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x9c277f40c7bf5381, 0x0, 0x0) [ 1006.706661][T24962] vxfs: WRONG superblock magic 00000000 at 1 [ 1006.737382][T24962] vxfs: WRONG superblock magic 00000000 at 8 [ 1006.744882][T24962] vxfs: can't find superblock. [ 1006.831474][T24968] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1006.898271][T24970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:43:03 executing program 4: clock_gettime(0x0, &(0x7f0000003400)) 02:43:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 02:43:03 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x45, 0x0, &(0x7f0000000080)) 02:43:03 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) 02:43:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x4c000000, &(0x7f0000000540)=ANY=[]) 02:43:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0x0) 02:43:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfbffffff, &(0x7f0000000540)=ANY=[]) 02:43:04 executing program 4: r0 = socket(0xa, 0x3, 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000280)={0x1d, r2}, 0x10) 02:43:04 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@broadcast, @multicast2, r2}, 0xc) [ 1007.819700][T24989] vxfs: WRONG superblock magic 00000000 at 1 02:43:04 executing program 5: r0 = socket(0xa, 0x3, 0x4) connect(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr=0x64010100}, 0x80) [ 1007.885751][T24989] vxfs: WRONG superblock magic 00000000 at 8 [ 1007.892248][T24989] vxfs: can't find superblock. 02:43:04 executing program 3: r0 = socket(0x22, 0x3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r0) 02:43:04 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 02:43:04 executing program 4: r0 = socket(0x22, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x80044943, 0x0) 02:43:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfd9c0baf, &(0x7f0000000540)=ANY=[]) 02:43:05 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x28, 0x0, 0x0, "e8a35e1cd37767adc289a373aefd235fea"}, 0x28}, 0x0) 02:43:05 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x28}}], 0x1, 0x0) 02:43:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x5c000000, &(0x7f0000000540)=ANY=[]) 02:43:05 executing program 2: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000001100)) 02:43:05 executing program 4: pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000004c0)) 02:43:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfdfdffff, &(0x7f0000000540)=ANY=[]) 02:43:06 executing program 4: r0 = socket(0xa, 0x3, 0x6) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 02:43:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000027c0)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@flowinfo={{0x14, 0x29, 0xb, 0x3ff}}, @flowinfo={{0x14, 0x29, 0xb, 0x10000000}}], 0x30}}], 0x1, 0x0) 02:43:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x31, 0x5000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000900)=ANY=[], 0x100000545) 02:43:06 executing program 2: socket$caif_stream(0x25, 0x1, 0x3) [ 1009.854823][T25034] vxfs: WRONG superblock magic 00000000 at 1 [ 1009.887018][T25034] vxfs: WRONG superblock magic 00000000 at 8 [ 1009.893658][T25034] vxfs: can't find superblock. 02:43:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x60000000, &(0x7f0000000540)=ANY=[]) 02:43:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfdffffff, &(0x7f0000000540)=ANY=[]) 02:43:06 executing program 2: poll(0x0, 0x0, 0x2) 02:43:06 executing program 4: pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0) 02:43:07 executing program 5: r0 = socket(0xa, 0x3, 0x4) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0x0) [ 1010.910892][T25058] vxfs: WRONG superblock magic 00000000 at 1 [ 1010.946793][T25058] vxfs: WRONG superblock magic 00000000 at 8 [ 1010.953296][T25058] vxfs: can't find superblock. 02:43:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@window, @window, @sack_perm, @window, @window, @sack_perm, @timestamp, @window], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x3458, 0x805, 0x0, 0x6) 02:43:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 02:43:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfeffffff, &(0x7f0000000540)=ANY=[]) 02:43:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x68000000, &(0x7f0000000540)=ANY=[]) 02:43:07 executing program 4: sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d80)={&(0x7f0000000d40)='./file0\x00', 0x0, 0x8}, 0x10) 02:43:07 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)) [ 1011.890304][T25081] vxfs: WRONG superblock magic 00000000 at 1 [ 1011.971254][T25081] vxfs: WRONG superblock magic 00000000 at 8 [ 1011.977479][T25081] vxfs: can't find superblock. 02:43:08 executing program 2: r0 = socket(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x23, 0x0) 02:43:08 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000100)) 02:43:08 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'syztnl2\x00', 0x0}) r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 02:43:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff000000, &(0x7f0000000540)=ANY=[]) 02:43:08 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:43:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x6c000000, &(0x7f0000000540)=ANY=[]) 02:43:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0xf}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0x0) [ 1012.944010][T25108] vxfs: WRONG superblock magic 00000000 at 1 [ 1012.969503][T25108] vxfs: WRONG superblock magic 00000000 at 8 [ 1012.975712][T25108] vxfs: can't find superblock. 02:43:09 executing program 4: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000a80)) 02:43:09 executing program 5: r0 = socket(0xa, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00'}) 02:43:09 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmmsg(r0, &(0x7f0000000380)=[{{&(0x7f0000000140)=@l2tp={0x2, 0x0, @dev}, 0x80, 0x0}}, {{&(0x7f0000000040)=@generic={0x21, "f492f66d8abc1261523ac1d2f1caf970086c42b50342d7e24d814264465cc4c4e1c037b7ecb34796ae9ea8276fd43c1dceee2e8aa7104e5015a87d1e59d45597b709a3917f5677993c7ba58e2043734589ec501ecc20e41730d7822ab2fdf98a6104ccd539c506a7f07735b5ccb4c361b5b60eb8dbcd0323eedb97c73a78"}, 0x80, 0x0}}], 0x2, 0x0) 02:43:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x74000000, &(0x7f0000000540)=ANY=[]) 02:43:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff0f0000, &(0x7f0000000540)=ANY=[]) 02:43:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)={0x14, 0x3, 0x6, 0x101}, 0x14}}, 0x0) 02:43:10 executing program 5: pipe(&(0x7f0000000800)={0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 02:43:10 executing program 3: r0 = socket(0x11, 0xa, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r0) 02:43:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940), 0xf, 0x0) [ 1014.027041][T25137] vxfs: WRONG superblock magic 00000000 at 1 02:43:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x6}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0xb80b) [ 1014.108224][T25137] vxfs: WRONG superblock magic 00000000 at 8 [ 1014.115933][T25137] vxfs: can't find superblock. 02:43:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffbffff, &(0x7f0000000540)=ANY=[]) 02:43:10 executing program 5: r0 = socket(0x1d, 0x2, 0x2) accept4(r0, 0x0, 0x0, 0x0) 02:43:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x7a000000, &(0x7f0000000540)=ANY=[]) 02:43:11 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={0x0, 0x0, 0x8}, 0x10) 02:43:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:43:11 executing program 3: socketpair(0x29, 0x2, 0x3, &(0x7f0000000200)) 02:43:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffe000, &(0x7f0000000540)=ANY=[]) [ 1015.153519][T25161] vxfs: WRONG superblock magic 00000000 at 1 [ 1015.182985][T25161] vxfs: WRONG superblock magic 00000000 at 8 [ 1015.189465][T25161] vxfs: can't find superblock. 02:43:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000001080)) 02:43:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="7890"], 0x78}}, 0x0) 02:43:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:11 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xd43}, 0x1c, 0x0}}], 0x1, 0x0) 02:43:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x80402002, &(0x7f0000000540)=ANY=[]) 02:43:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffbff, &(0x7f0000000540)=ANY=[]) 02:43:12 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={0xa, 0x0, 0x0, @empty}, 0x20) 02:43:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 02:43:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 02:43:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x8cffffff, &(0x7f0000000540)=ANY=[]) [ 1016.729569][T25178] dccp_close: ABORT with 20 bytes unread 02:43:13 executing program 5: socketpair(0x18, 0x0, 0x0, &(0x7f0000000a80)) 02:43:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffdf9, &(0x7f0000000540)=ANY=[]) 02:43:13 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000580)={@dev, @broadcast}, &(0x7f00000005c0)=0xc) 02:43:13 executing program 2: socketpair(0x25, 0x5, 0x0, &(0x7f0000000580)) 02:43:14 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x97ffffff, &(0x7f0000000540)=ANY=[]) 02:43:14 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:14 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:14 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) connect(r0, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x80) 02:43:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffdfd, &(0x7f0000000540)=ANY=[]) 02:43:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xa501fcf5, &(0x7f0000000540)=ANY=[]) 02:43:15 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0xffffffff, 0x4) [ 1019.255710][T25235] dccp_close: ABORT with 20 bytes unread [ 1019.319833][T25231] dccp_close: ABORT with 20 bytes unread 02:43:15 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff7f, &(0x7f0000000540)=ANY=[]) 02:43:16 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:16 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x6}}], 0x1, 0x0) 02:43:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xaf0b9cfd, &(0x7f0000000540)=ANY=[]) 02:43:16 executing program 3: r0 = socket$phonet(0x23, 0x2, 0x1) getsockopt$sock_timeval(r0, 0x1, 0xa, 0x0, &(0x7f0000000040)) 02:43:16 executing program 2: r0 = socket(0xa, 0x3, 0x4) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) 02:43:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff8c, &(0x7f0000000540)=ANY=[]) 02:43:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xb9000000, &(0x7f0000000540)=ANY=[]) 02:43:17 executing program 3: socket(0x25, 0x5, 0x2) 02:43:17 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:17 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) connect(r0, &(0x7f0000000000)=@nl, 0x80) 02:43:17 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff97, &(0x7f0000000540)=ANY=[]) 02:43:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc0ed0000, &(0x7f0000000540)=ANY=[]) 02:43:18 executing program 3: socket$inet6(0xa, 0x80805, 0x0) 02:43:18 executing program 2: pipe(&(0x7f0000000800)={0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) [ 1022.184699][T25313] vxfs: WRONG superblock magic 00000000 at 1 [ 1022.267302][T25313] vxfs: WRONG superblock magic 00000000 at 8 [ 1022.274174][T25313] vxfs: can't find superblock. 02:43:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffff6, &(0x7f0000000540)=ANY=[]) 02:43:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000500), r0) 02:43:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc50b0000, &(0x7f0000000540)=ANY=[]) 02:43:19 executing program 2: socketpair(0x14, 0x0, 0x0, &(0x7f0000006340)) 02:43:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000800)={0xffffffffffffffff}) poll(&(0x7f0000000480)=[{}, {r0}, {r1}, {}], 0x4, 0xfffffffe) 02:43:19 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) 02:43:19 executing program 2: socket(0x3, 0x0, 0x7fff) 02:43:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffb, &(0x7f0000000540)=ANY=[]) 02:43:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc60b0000, &(0x7f0000000540)=ANY=[]) 02:43:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000170a01"], 0x20}}, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 02:43:20 executing program 2: socketpair(0xa, 0x5, 0x0, &(0x7f0000000180)) [ 1024.386583][T25365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 02:43:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffd, &(0x7f0000000540)=ANY=[]) 02:43:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xc70b0000, &(0x7f0000000540)=ANY=[]) 02:43:20 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) [ 1024.813505][T25365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 02:43:21 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x12, 0x0, &(0x7f0000000080)) 02:43:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000009c0)={&(0x7f00000005c0)={0xa, 0x4e24, 0x0, @mcast2, 0xbb}, 0x1c, &(0x7f0000000780)=[{0x0}, {0x0}], 0x2, &(0x7f00000007c0)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}, @dstopts={{0x30, 0x29, 0x37, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @remote}]}}}], 0x60}, 0x0) 02:43:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg(r0, &(0x7f0000005280)=[{{&(0x7f0000000080)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}}], 0x1, 0x0) 02:43:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf5fc01a5, &(0x7f0000000540)=ANY=[]) 02:43:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffe, &(0x7f0000000540)=ANY=[]) 02:43:22 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000c80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) 02:43:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001100)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 02:43:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, 0x0}, 0x78) 02:43:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf6ffffff, &(0x7f0000000540)=ANY=[]) 02:43:22 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) 02:43:23 executing program 2: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) 02:43:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x5, 0x820, 0x7c, 0x2}, 0x40) 02:43:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffffff, &(0x7f0000000540)=ANY=[]) 02:43:23 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 02:43:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) 02:43:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xf9fdffff, &(0x7f0000000540)=ANY=[]) 02:43:24 executing program 3: pipe(&(0x7f0000000800)={0xffffffffffffffff}) read(r0, &(0x7f0000000000)=""/176, 0xb0) 02:43:24 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 02:43:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mknodat$loop(r1, &(0x7f0000000200)='./file0\x00', 0x6300, 0x1) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="296aa4e6fcd7c235b411411c404750e7e86b103b518c526ae56f35206ebdfbf1de5f2265452e0645b5b6a7fb56356218f18a626d6d2ae22e4b54229c2b079c966064452bbf2ef5939aca10f7abacf5e542be2345802370351dbef44db744a00e0a29d0a967601032e97b20e1164c3f96162c97df992126d420bbb5dd2ac6fa35c64b62d4d944d448c879629f39edd1acad342532de972b8700fe", 0x9a, 0xfffffffd}], 0x955000, &(0x7f0000000540)=ANY=[]) 02:43:24 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@local, @private2, @private0, 0x0, 0x3ba5, 0x8b, 0x0, 0x0, 0x1180080}) 02:43:24 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfbffffff, &(0x7f0000000540)=ANY=[]) 02:43:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x4, 0xe2, &(0x7f0000000080)=""/226, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1028.774932][T25463] loop1: detected capacity change from 0 to 264192 [ 1028.946894][T25468] loop1: detected capacity change from 0 to 264192 02:43:25 executing program 2: r0 = timerfd_create(0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000004, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000040)) 02:43:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) openat$ipvs(0xffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000600)={r2, 0x0, 0x1, [0x4, 0xfd9, 0x8, 0x1, 0x4], [0x101, 0x401, 0x7, 0x7, 0x62, 0x100000000, 0x6, 0x1, 0x10000, 0x5, 0x7fff, 0x2, 0x80000001, 0x2, 0x3, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffa, 0x1f3402dc, 0x2, 0x10000, 0x8, 0x907, 0x7, 0x1, 0x40, 0x5642, 0xfffffffffffffc01, 0x7, 0x1c00, 0x3c8, 0x8, 0x5, 0x8, 0x4, 0x702, 0x2, 0x7, 0xfffffffffffffffe, 0x6, 0xffff, 0xed3f, 0x10001, 0x1f, 0x40, 0x8000, 0x7ff, 0x80, 0x400, 0x1f, 0x0, 0x9, 0x80000000, 0x4, 0xc2c, 0x0, 0xfff, 0x7, 0x7, 0x8001, 0x5, 0x9, 0x8, 0x0, 0x7, 0xffffffffffffffff, 0x6, 0x6, 0x1, 0xfffffffffffffffb, 0x1000, 0x246e, 0x3, 0x2, 0x3, 0xbb00000000000000, 0x5, 0x5, 0x1, 0x760, 0x1d, 0x3, 0x200, 0x3, 0xff, 0xff, 0x6, 0xc431f78, 0x7fffffff, 0x5c, 0xffffffffffffffff, 0x1ff, 0x1, 0x8, 0xffff, 0xffffffff, 0x2, 0xff, 0x5, 0xfffffffffffffff9, 0x1, 0xb395, 0x3f, 0xfffffffffffffffc, 0x3ff, 0x2, 0x10000, 0xfff, 0xcf68, 0xc4, 0x0, 0x3, 0x7, 0x1, 0x2, 0xffffffffffffffe0, 0x80000000, 0x0, 0x3, 0x4, 0x7]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:25 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x6900) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffff7) 02:43:25 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x3c) 02:43:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfd9c0baf, &(0x7f0000000540)=ANY=[]) [ 1029.846949][T25488] loop3: detected capacity change from 0 to 16 02:43:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0) [ 1030.120150][ T34] audit: type=1804 audit(1620701006.450:389): pid=25488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir709707129/syzkaller.s5IX7J/677/bus" dev="sda1" ino=15341 res=1 errno=0 [ 1030.186938][ T34] audit: type=1804 audit(1620701006.510:390): pid=25496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir709707129/syzkaller.s5IX7J/677/file0/bus" dev="loop3" ino=3 res=1 errno=0 [ 1030.191783][T25495] vxfs: WRONG superblock magic 00000000 at 1 02:43:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1030.515681][T25495] vxfs: WRONG superblock magic 00000000 at 8 [ 1030.522634][T25495] vxfs: can't find superblock. 02:43:26 executing program 3: getpid() fork() 02:43:26 executing program 4: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1030.788806][T25495] vxfs: WRONG superblock magic 00000000 at 1 [ 1030.816683][T25495] vxfs: WRONG superblock magic 00000000 at 8 [ 1030.823157][T25495] vxfs: can't find superblock. 02:43:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfdfdffff, &(0x7f0000000540)=ANY=[]) 02:43:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 02:43:27 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$isdn(0x22, 0x2, 0x26) dup2(r2, r3) fcntl$setown(r2, 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:27 executing program 4: keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) 02:43:27 executing program 3: socketpair(0x2, 0xa, 0x9, &(0x7f0000000040)) [ 1031.793443][T25537] delete_channel: no stack 02:43:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfdffffff, &(0x7f0000000540)=ANY=[]) 02:43:28 executing program 2: syz_emit_ethernet(0x7a, &(0x7f00000010c0)={@local, @empty, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "6c1db4", 0x44, 0x2f, 0x0, @private1, @empty}}}}, 0x0) [ 1031.941472][T25537] vxfs: WRONG superblock magic 00000000 at 1 [ 1031.997459][T25537] vxfs: WRONG superblock magic 00000000 at 8 [ 1032.003912][T25537] vxfs: can't find superblock. 02:43:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000004, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x2, 0x0) getsockname$packet(r1, 0x0, 0x0) [ 1032.174329][T25549] delete_channel: no stack 02:43:28 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfeffffff, &(0x7f0000000540)=ANY=[]) 02:43:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40012121, 0x0) 02:43:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000000100)=""/233, 0xe9}], 0x2, 0x4, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$bfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x9, 0x1, &(0x7f0000000340)=[{&(0x7f00000002c0)="4a3f2c253b27c4e94a6b17757c1b0e71152449c0027820f9d498e0c5f770efbf660f80cc5a1f8834858e873921498e16089f92010930e84641474990c2d958fd283570d4376a5bb618aa81837a49b448fd7d3cda00173a08467a719217ea87fe988ce0e1e7", 0x65, 0xb5}], 0x1000000, &(0x7f0000000380)={[{'.&\xa1'}, {'/dev/zero\x00'}], [{@context={'context', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, '/dev/zero\x00'}}, {@obj_role={'obj_role', 0x3d, 'vxfs\x00'}}]}) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:29 executing program 2: unshare(0x400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x0) 02:43:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[], 0x15cb3c6c) socket$packet(0x11, 0xa, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r2, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 02:43:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) prlimit64(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:43:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff000000, &(0x7f0000000540)=ANY=[]) 02:43:30 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x6000000f}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x200035, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000240)) 02:43:30 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000005440)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000005380)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/18, 0x12}, {&(0x7f0000000200)=""/66, 0x42}, {&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000340)=""/206, 0xce}], 0x4, &(0x7f0000000440)=""/4096, 0x1000}, 0xe9e4}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001440)=""/129, 0x81}], 0x1, &(0x7f0000001540)=""/4096, 0x1000}, 0xff}, {{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000002540)=""/222, 0xde}, {&(0x7f0000002640)=""/50, 0x32}, {&(0x7f0000002680)=""/150, 0x96}, {&(0x7f0000002740)=""/10, 0xa}, {&(0x7f0000002780)=""/242, 0xf2}], 0x5, &(0x7f00000028c0)=""/4096, 0x1000}, 0x4}, {{&(0x7f00000038c0)=@qipcrtr, 0x80, &(0x7f0000003980)=[{&(0x7f0000003940)}], 0x1, &(0x7f00000039c0)=""/34, 0x22}, 0x81}, {{0x0, 0x0, &(0x7f0000003d80)=[{&(0x7f0000003a00)=""/131, 0x83}, {&(0x7f0000003ac0)=""/37, 0x25}, {&(0x7f0000005680)=""/243, 0xf3}, {&(0x7f0000003c00)=""/138, 0x8a}, {&(0x7f0000003cc0)=""/166, 0xa6}], 0x5}, 0x1000}, {{0x0, 0x0, &(0x7f0000005280)=[{&(0x7f0000003dc0)=""/162, 0xa2}, {&(0x7f0000003e80)=""/145, 0x91}, {&(0x7f0000003f40)=""/108, 0x6c}, {&(0x7f0000003fc0)=""/10, 0xa}, {&(0x7f0000004000)=""/95, 0x5f}, {&(0x7f0000004080)=""/234, 0xea}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f00000054c0)=""/180, 0xb4}, {&(0x7f0000005180)=""/3, 0x3}], 0x9, &(0x7f0000003b80)=""/100, 0x64}, 0x18c7}], 0x6, 0x140, &(0x7f0000005480)={r2, r3+60000000}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000003940)="e047b521b836f1b85fb5776a69d0e584c39cc6280ae7c0280ad9c9417113dda5dca013d66860d967d21743a9535608f320c60e6e573d299fd499f6", 0x3b) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:30 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 1034.256690][T25590] vxfs: WRONG superblock magic 00000000 at 1 [ 1034.263934][T25590] vxfs: WRONG superblock magic 00000000 at 8 [ 1034.270420][T25590] vxfs: can't find superblock. 02:43:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xff0f0000, &(0x7f0000000540)=ANY=[]) [ 1034.435444][T25606] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:43:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) 02:43:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000355000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x4d96b000) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 1034.563356][T25614] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:43:31 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)) 02:43:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffbffff, &(0x7f0000000540)=ANY=[]) [ 1035.313347][T25628] vxfs: WRONG superblock magic 00000000 at 1 [ 1035.409733][T25628] vxfs: WRONG superblock magic 00000000 at 8 [ 1035.417734][T25628] vxfs: can't find superblock. 02:43:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20}, {0x6}]}) 02:43:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x20}, {0x6}]}, 0x10) 02:43:32 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:32 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x9, 0x8, 0x8001, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000080)={r1}) 02:43:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$isdn(0x22, 0x2, 0x26) r3 = dup2(r1, r2) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f00000000c0)={0x1, 0xffffffffffffffff, 0x1}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x280000e, 0x11, r4, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) mount$9p_fd(0x0, &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80), 0x40, &(0x7f0000000bc0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@uname={'uname', 0x3d, 'lookup\x00'}}, {@access_any}], [{@subj_user={'subj_user', 0x3d, 'ip6erspan0\x00'}}, {@obj_role={'obj_role', 0x3d, 'lookup\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@appraise_type}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@dont_measure}, {@uid_gt={'uid>', 0xee01}}]}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$isdn(0x22, 0x2, 0x26) dup2(r5, r6) sendmsg$NFT_BATCH(r5, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_DELCHAIN={0x1c, 0x5, 0xa, 0x700, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_CHAIN_FLAGS={0x8}]}, @NFT_MSG_NEWRULE={0xf4, 0x6, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x5}, @NFTA_RULE_USERDATA={0x59, 0x7, 0x1, 0x0, "d90709733eb981be45bf6285730d454884f5ef6284bfc21b36ee73bc3c619989ecbe4ce3ae83251a16288f4f6abf5f90600aefe8012a0567b9d10d04b5897206268deffe62fa7e4ca7c9fb0c11384023e0cffbb75f"}, @NFTA_RULE_USERDATA={0x77, 0x7, 0x1, 0x0, "d8912a5a4394b010bb03dcecc482388ac9f92ef5ea4f049305988d77d946e0e8196158128f24c63e7b17cb6614ad690f3807c75a35283ee92bc7d9b911572a95bf6c46fa5ab53535e9e4ec94abc61cc5089287494009b826b31e1e77002dada366f96dee04e561b4e71b06358f2b9f266d4e4e"}]}, @NFT_MSG_DELSET={0x9c, 0xb, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x8}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x1}, @NFTA_SET_DESC={0x74, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x48, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffe1}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffe0}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xf04}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x80}]}]}, @NFT_MSG_DELFLOWTABLE={0x188, 0x18, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x160, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'syzkaller1\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ipvlan1\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'caif0\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'ip6_vti0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'ip6erspan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vxcan1\x00'}, {0x14, 0x1, 'gre0\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'veth0_virt_wifi\x00'}]}]}]}, @NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0xa}}, @NFT_MSG_NEWSET={0x42c, 0x9, 0xa, 0x801, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_SET_USERDATA={0x6b, 0xd, 0x1, 0x0, "a55afcd1f9fab65105e1ac42606db306814a39ad3b0a39abc3d99e9180231af11ec1e4da43b94640f87abe87f2e2370d2cb0cb1ce1e7140fa7862846bbd031f128711ad80feafa87064bd7528df8b1b855e22876f9276e97d6b3e60050e90e3b1ce95cf82f1ce3"}, @NFTA_SET_DESC={0x29c, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x9c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffc01}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x63}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffff7f}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xd030}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_DESC_CONCAT={0xd8, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2a1}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x40000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8001}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3e}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8f}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4b3baad2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6a74642c}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}]}]}, @NFTA_SET_DESC_CONCAT={0x58, 0x2, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfb0}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xccd}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8}, @NFTA_SET_DESC_CONCAT={0x9c, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffff8000}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1a}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xdd77}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffff999}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x51b8a937}]}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xfc}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x7fff}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x18}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_GC_INTERVAL={0x8}, @NFTA_SET_USERDATA={0xda, 0xd, 0x1, 0x0, "370f8dca07725d63351aa761c7cf4ae742f8f47645637d015f175271c2e39a6869c18518112744de5dc27bdeaea8f6445ee5cb22aa140b1da111aa0c75457dc78fe2b2e010349fdd9057872acc9aa389ee9b760397f3c7c6300c449f84996abb37d4cb7a4875eee0c4cdd7187455590cf1d367ce498cdd91426d1045d4ef85ef521cc83b65eae01acb6969a815c3363e186288c9e06860cd3add07ca16523f58aaa913ac014f2165a0e2953ca2e84c361fa4550588e243293d3ee03f691f796a59800286be967027dd68a9196dd17be7329e5f4047d5"}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1a}]}, @NFT_MSG_NEWSET={0x1c, 0x9, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x20}]}, @NFT_MSG_DELSET={0x114, 0xb, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @dynset={{0xb}, @void}}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_EXPR={0x10, 0x11, 0x0, 0x1, @tunnel={{0xb}, @void}}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xe1}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xe9}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x5}, @NFTA_SET_USERDATA={0xa2, 0xd, 0x1, 0x0, "754a6479d24a0688506009cff53b4d8cb8c1c6842ee579735df005162babb86838dd83ac552e3fdd0023cda98f5f10431401f09375783d8e942bc79db5f0730ba7467dd9bda9405083ff9378a114b26bcc163150a4b84420e22d03b890983da751a2b89d84b342bdfab3d2f180bbd6385511ff9067a0f871960a044b56b4337d79ca582e5e61c3e5b7cf9a2a7c3dfef3c73265f957fded54aca0fdc178ba"}]}, @NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_SET_EXPR={0x4c, 0x11, 0x0, 0x1, @dynset={{0xb}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_DYNSET_EXPR={0x10, 0x7, 0x0, 0x1, {{0xb}, @void}}, @NFTA_DYNSET_TIMEOUT={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_DYNSET_TIMEOUT={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_DYNSET_EXPR={0x10, 0x7, 0x0, 0x1, {{0xb}, @void}}]}}}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x200}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x2b}]}], {0x14}}, 0x93c}, 0x1, 0x0, 0x0, 0x40070}, 0x20000001) [ 1035.976427][ T34] audit: type=1326 audit(1620701012.300:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25642 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7ff4549 code=0x0 02:43:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffe000, &(0x7f0000000540)=ANY=[]) 02:43:32 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000200)={0x5a}, 0xfe85) fcntl$setstatus(r0, 0x4, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x20400, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 1036.427370][T25661] delete_channel: no stack [ 1036.570964][T25661] vxfs: WRONG superblock magic 00000000 at 1 [ 1036.620481][T25667] delete_channel: no stack [ 1036.667639][T25661] vxfs: WRONG superblock magic 00000000 at 8 [ 1036.674317][T25661] vxfs: can't find superblock. [ 1036.695339][ T8885] kernel read not supported for file /zero (pid: 8885 comm: kworker/0:5) [ 1036.814040][ T34] audit: type=1326 audit(1620701013.140:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25642 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7ff4549 code=0x0 [ 1036.866542][T25659] delete_channel: no stack [ 1036.871733][T25659] delete_channel: no stack 02:43:33 executing program 4: syslog(0x2, &(0x7f0000000040)=""/55, 0x37) [ 1037.049506][ T8457] kernel read not supported for file /zero (pid: 8457 comm: kworker/1:4) [ 1037.107507][ T34] audit: type=1804 audit(1620701013.430:393): pid=25676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir442507856/syzkaller.pY0MZI/719/bus" dev="sda1" ino=15359 res=1 errno=0 02:43:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x8, 0x5, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000004, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) [ 1037.298226][ T34] audit: type=1804 audit(1620701013.570:394): pid=25680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir442507856/syzkaller.pY0MZI/719/bus" dev="sda1" ino=15359 res=1 errno=0 [ 1037.323930][ T34] audit: type=1804 audit(1620701013.610:395): pid=25680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir442507856/syzkaller.pY0MZI/719/bus" dev="sda1" ino=15359 res=1 errno=0 [ 1037.349759][ T34] audit: type=1804 audit(1620701013.670:396): pid=25676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir442507856/syzkaller.pY0MZI/719/bus" dev="sda1" ino=15359 res=1 errno=0 02:43:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffbff, &(0x7f0000000540)=ANY=[]) 02:43:33 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0/file0\x00', 0x101, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="4840af097190e72aa34e189cd50784081545068a10a36aaaeea4ce059da40df70deca284e33482322f3e8f1eee398192d3188f54412b210d66b2186c46b7d8242540f8436e8ee3f51e13a2445ee29672444ca5d71b52d207e4931d5e", 0x5c, 0x9}], 0x180000, &(0x7f0000000240)=ANY=[@ANYBLOB='iocharset=cp865,uid=', @ANYRESHEX, @ANYBLOB=',iocharset=macgaelic,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b6673666c6f6f723d76786673002c686173682c646566636f6e746578741d73797361646d5f752c736d61636b6673726f6f743d3a245c5b25262c666f776e65723c", @ANYRESDEC=0xee00, @ANYBLOB="2c66736e616d653df92d8e2c00"]) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x3, 0x83, 0x1f, 0x3, 0x3, 0x3e, 0x1, 0x1fb, 0x34, 0x1, 0x6, 0x9, 0x20, 0x1, 0x5, 0x18d5, 0xc4}, [{0x60000000, 0x8, 0x4, 0x7fff, 0x2, 0xff, 0x6, 0x5}, {0x2, 0x3, 0xfffffffb, 0x1, 0x4, 0x101, 0x5, 0x40}], "d08a98b91f7beb87d0f509762dcddafd3501cae906e355ae11d379fcd67e56c5d3fdeb1c30b5c0150a879a37353ddb486ab26ea89424f0995a13c9f1a5172dbd60066568dda73e40aec34885aa21f074e8dcac6685b9f963e12b1d51f2480f98030a6c845cce6d5d487c78", ['\x00', '\x00', '\x00', '\x00']}, 0x4df) mmap(&(0x7f0000786000/0x2000)=nil, 0x2000, 0x4, 0x30, r2, 0x72325000) shmget$private(0x0, 0x800000, 0x20, &(0x7f00002fc000/0x800000)=nil) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f88a65d681e8b484d64732fdcfc11f34", @ANYRES16=r5, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32=r6, @ANYBLOB="0400ec0008009e0008080000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r5, 0x0, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000000) r7 = signalfd4(r0, &(0x7f0000000400)={[0xf9, 0x1]}, 0x8, 0x800) ioctl$KVM_SET_PIT(r7, 0x8048ae66, &(0x7f0000000440)={[{0x0, 0x3, 0x8, 0x1, 0x84, 0x2, 0x0, 0x2, 0x52, 0x6, 0x0, 0x4, 0x2}, {0x3, 0x5, 0x3, 0x7, 0x18, 0x8, 0x20, 0x0, 0x80, 0x6, 0x9, 0x4, 0x6}, {0xfffffff7, 0x1, 0x69, 0x4, 0x81, 0x8, 0x9, 0x40, 0x1d, 0x0, 0x40, 0x5d, 0x7fff}], 0x8}) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) 02:43:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000180), 0x4) 02:43:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000004, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) link(&(0x7f0000000080)='./file0\x00', 0x0) [ 1038.292014][T25699] vxfs: WRONG superblock magic 00000000 at 1 [ 1038.307982][T25699] vxfs: WRONG superblock magic 00000000 at 8 [ 1038.314265][T25699] vxfs: can't find superblock. 02:43:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffdf9, &(0x7f0000000540)=ANY=[]) 02:43:34 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r3 = syz_mount_image$fuse(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100800, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3c24000000}}, {@max_read={'max_read', 0x3d, 0xb7b4}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8}}], [{@obj_type}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':-,$@/'}}, {@measure}, {@obj_role={'obj_role', 0x3d, '\x1c-gT\xb6\xcc}\xaa\xcbY\x98u\xd7\xfa\xf9\xbb'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x62, 0xe, 0x38, 0x61, 0x61, 0x35, 0x36], 0x2d, [0x66, 0x39, 0x36, 0x62], 0x2d, [0x62, 0x61, 0x38], 0x2d, [0x62, 0x62, 0x64, 0x37], 0x2d, [0x6190b583a0f421a3, 0x64, 0x63, 0x64, 0x31, 0x33, 0x64, 0x65]}}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_hash}]}}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000000c0)={@id={0x2, 0x0, @auto="8f603661a64e7da01ca3248ec31657da"}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:34 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x208202) truncate(&(0x7f0000000080)='./bus\x00', 0x3) 02:43:35 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u, 0x22}]}}) 02:43:35 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1039.133440][T25728] loop4: detected capacity change from 0 to 16 02:43:35 executing program 2: open$dir(&(0x7f0000000600)='./file0\x00', 0xae2f5e3dba92ae85, 0x0) [ 1039.415927][T25732] vxfs: WRONG superblock magic 00000000 at 1 02:43:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffdfd, &(0x7f0000000540)=ANY=[]) [ 1039.521259][T25732] vxfs: WRONG superblock magic 00000000 at 8 [ 1039.527480][T25732] vxfs: can't find superblock. 02:43:36 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/114, 0x72}], 0x1) [ 1039.726285][T25732] vxfs: WRONG superblock magic 00000000 at 1 [ 1039.757804][T25732] vxfs: WRONG superblock magic 00000000 at 8 [ 1039.764251][T25732] vxfs: can't find superblock. [ 1039.803203][T25743] 9pnet: Unknown protocol version 9p2000.u" 02:43:36 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u, 0x22}]}}) [ 1039.864526][T25749] 9pnet: Unknown protocol version 9p2000.u" 02:43:36 executing program 1: ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0xffffe000) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write(r0, 0x0, 0x0) [ 1040.446783][T25764] 9pnet: Unknown protocol version 9p2000.u" 02:43:36 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u, 0x22}]}}) 02:43:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff7f, &(0x7f0000000540)=ANY=[]) 02:43:37 executing program 4: r0 = socket$inet6(0x18, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 02:43:37 executing program 2: pipe(&(0x7f0000000040)) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 02:43:37 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u, 0x22}]}}) [ 1041.120960][T25776] 9pnet: Unknown protocol version 9p2000.u" 02:43:37 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$isdn(0x22, 0x2, 0x26) dup2(r2, r3) flistxattr(r2, &(0x7f00000000c0)=""/66, 0x42) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000140)=ANY=[]) 02:43:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff8c, &(0x7f0000000540)=ANY=[]) 02:43:38 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x1974dc12e71945c, 0x0) [ 1041.743017][T25795] 9pnet: Unknown protocol version 9p2000.u" [ 1041.793495][T25797] delete_channel: no stack 02:43:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000003c000591d24380648c63940d0135fc60060012400c0002020200000037153e370a0001805a256400d109", 0x2e}], 0x1}, 0x24000040) 02:43:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f00000015c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1041.918831][T25797] vxfs: WRONG superblock magic 00000000 at 1 [ 1041.948576][T25797] vxfs: WRONG superblock magic 00000000 at 8 [ 1041.955463][T25797] vxfs: can't find superblock. [ 1042.136397][T25797] delete_channel: no stack [ 1042.315606][T25812] netlink: set zone limit has 8 unknown bytes 02:43:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffff97, &(0x7f0000000540)=ANY=[]) 02:43:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) ioctl$HIDIOCGRDESC(r2, 0x90044802, &(0x7f0000000200)={0x8c2, "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"}) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:39 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1e, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:39 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0x5451, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0xfffffec8, 0x0, 0x7f, 0xff, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa1}, 0x0, 0x51fa, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000015c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') [ 1043.230895][T25820] vxfs: WRONG superblock magic 00000000 at 1 02:43:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x19, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1043.312825][T25820] vxfs: WRONG superblock magic 00000000 at 8 [ 1043.319285][T25820] vxfs: can't find superblock. 02:43:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf048}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) 02:43:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffff6, &(0x7f0000000540)=ANY=[]) 02:43:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r1, 0x3432b000) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000000)='GPL\x00', 0x6, 0x1006, &(0x7f00000025c0)=""/4102, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000c80)={0x4, 0x70, 0x6, 0x6, 0x7, 0x80, 0x0, 0x0, 0x10000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2b69a2cfc67e3e99, 0x0, 0x0, 0xfffffffffffffffc, 0x7fffffff, 0x9, 0x6022, 0x8001, 0x64ee}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r2 = perf_event_open$cgroup(0x0, r1, 0xc, 0xffffffffffffffff, 0x3) r3 = openat$cgroup(r1, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000a00)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000b40)={0x4, 0x70, 0xe0, 0x3f, 0x3, 0xff, 0x0, 0x3, 0x2100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x800, 0x10001, 0x4ed65d66, 0x8, 0x6, 0x5, 0xff}, 0xffffffffffffffff, 0x6, r2, 0x9) r4 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3, 0x90, 0xa9, 0x5, 0x0, 0x2, 0x0, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x6}, 0x5020, 0x7fffffff, 0x1, 0xa100269e69b07a4e, 0xffffffff, 0x8, 0x6, 0x0, 0x401, 0x0, 0xb5}, 0xffffffffffffffff, 0x6, r0, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xcddb) 02:43:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) 02:43:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffb, &(0x7f0000000540)=ANY=[]) 02:43:40 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x12, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480), &(0x7f00000014c0), 0x2, 0x1) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x940028, &(0x7f0000000200)={[{@metacopy_on}, {@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on}, {@xino_on}, {@index_off}, {@index_on}], [{@euid_eq={'euid', 0x3d, r2}}, {@uid_lt={'uid<', r4}}, {@subj_type={'subj_type', 0x3d, '('}}, {@subj_role={'subj_role', 0x3d, 'y\x00'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '.}{-'}}]}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$isdn(0x22, 0x2, 0x26) dup2(r5, r6) preadv(r6, &(0x7f0000001400), 0x0, 0x400, 0x5) 02:43:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) 02:43:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffd, &(0x7f0000000540)=ANY=[]) 02:43:41 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000006c0)=[{0x10, 0x0, 0x4}, {0x10}, {0x10}], 0x30}, 0x4000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1045.388315][T25877] vxfs: WRONG superblock magic 00000000 at 1 02:43:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) [ 1045.450150][T25877] vxfs: WRONG superblock magic 00000000 at 8 [ 1045.456610][T25877] vxfs: can't find superblock. [ 1045.475120][T25880] delete_channel: no stack 02:43:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@generic={0x1, "9a44480d95dbbaa667fe98970d797e9525835dc94380550a684dce22944ac7cb21f46a098b87de3a5b45193937763e37b5cf919286ba63cf3c81d62e436e5833abd6fcbcaaa05108a03be383b679a07c12e699efe95ebfc61c540e2eb8dee41a15ea41e4415ee0fb4469c6ed8bd3f07e239ca8d724203d0dcc0c2cb2c43c"}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="1bf2bb1eefbb0530ab95917c104855d4a7d3ab8046c1c303952f30678ab7308c3cd288bab5d4d0e2dba991", 0x2b}, {&(0x7f0000000200)="2d1a2def2d6786ae33538ab542ceaca3b46fc9d6493a69722d50153e108e368ace9efef3957017b594ed16b7bf855f758c1f03317deb9dae2f4ba9557005d1d4e8558d93cd0c925a1ff5f158e4d6ad508b51b41d8fbdf3911a74a123ffefd98ea109fe995396a8f00950a8bd125ba15b0b8a3c505afc6a32480ffa7de3a5bea95a2ffd0c19bb20fab995a08fd319212f0f6f76e9bd210885f2e19d9a9fddce42ea6fac10936870fbfa2c13db9bda10a2c4a0286b356845709bcd3589a519efe9aabd6510dd99bbe309449a13c7251e3e1a137d3d8df0458d56188485cdb5f7b810bb45a3", 0xe4}, {&(0x7f0000000300)="6358eb011eb4609bab035f353ee490c417ac8e78d604f533f7b89e634eb21987f0ee7094e80b83522611720f567aaafc5b515cdf61271e1384db1f2c3a729aff848f5301d9201be1c5066871d229b57b7b45117242b571c39a3816b7f5858f021f66f2c4e89fe04b3d089b3ece92df521fc6697cec1062e6d67c5b1359471aa544ab4d29b5", 0x85}, {&(0x7f00000003c0)="7b8f9cc9cc944093bb18069e84d68682ee41a51bf827aa63524a8a17f96313e7be80f3bceeeae4fb381f22dacea6b797263a2c96db179d689f2fdbace611f878128bf70488cb39d06e9491398c5a31ff93ff8de4a8c13fd0923ebd627f51703be354b348ecef17f500fc437c1052ffdaeecfac9937a15c2cc764845b", 0x7c}], 0x4}, 0x4080) 02:43:42 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x50e43786}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x400454cd, &(0x7f0000000340)={0x2, &(0x7f00000000c0)=[{}, {0x6}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x40000d) close(r3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x24, 0x4, 0x0, 0x0, 0xa2, 0x90080, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x4, 0x0, 0x1, 0x4, 0x8, 0x6, 0x0, @perf_bp, 0x420c0}, 0x0, 0x10, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x17, 0x9, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfa}, [@map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}, @exit, @generic={0x7, 0x0, 0x0, 0x3}, @ldst={0x1, 0x1, 0x0, 0x0, 0x3, 0xffffffffffffffe0, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x0, 0x6, 0x4, 0x20, 0x8}]}, 0x0, 0x8, 0xab, &(0x7f0000000680)=""/171, 0x40f00, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0x9, 0x1a52}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000200)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0xfff) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000240)={'netpci0\x00'}) 02:43:42 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)) 02:43:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x1a1ea6, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f00000015c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xfffffffe, &(0x7f0000000540)=ANY=[]) 02:43:42 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1046.347071][T25898] vxfs: WRONG superblock magic 00000000 at 1 [ 1046.368262][T25898] vxfs: WRONG superblock magic 00000000 at 8 [ 1046.376424][T25898] vxfs: can't find superblock. 02:43:43 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000100a00"], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa6, &(0x7f0000000100)=""/166, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) perf_event_open$cgroup(&(0x7f0000000380)={0x3, 0x80, 0x5, 0x3, 0xf7, 0x2, 0x0, 0x0, 0x30421, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd0, 0x0, @perf_config_ext={0x1, 0x2}, 0x860, 0x7, 0x6, 0x2, 0x2, 0x0, 0xff, 0x0, 0x8000, 0x0, 0x10001}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='qdisc_dequeue\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0xb) 02:43:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x5a1042, 0x161) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) mknodat$null(r2, &(0x7f0000000040)='./file0\x00', 0x20, 0x103) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x801c7011, &(0x7f0000000080)) clone3(&(0x7f0000000300)={0x0, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), {0x12}, &(0x7f0000000200)=""/102, 0x66, &(0x7f0000000280), &(0x7f00000002c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3, {r0}}, 0x58) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000380), &(0x7f00000003c0)={0x0, 0xfb, 0x1015, 0x4, 0x0, "69da71f9cf54fe103f71fa5a5989d10f", "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"}, 0x1015, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 02:43:43 executing program 3: socketpair(0xa, 0x2, 0x88, &(0x7f0000000000)) 02:43:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x6, &(0x7f0000000040)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xff}, @ldst={0x3, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f00000025c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0xffffffff, &(0x7f0000000540)=ANY=[]) 02:43:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x1, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f00000015c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:44 executing program 2: socketpair(0x2, 0x3, 0x73, &(0x7f0000000000)) 02:43:44 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f00006ce000/0x2000)=nil, 0x2000, 0x3000008, 0x110, r0, 0xc591c000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0xffffff81, 0x2, &(0x7f0000000140)=[{&(0x7f0000000200)="70f212a3020297e8ed480cc14bf3b83a190285b8bab1312ed713b132443b2850e2039fa1179f604d117b7826324811718bbee3c16b279c71f5f16df7c04d18a929f24e6a3509dfac8a6914813be81f68b635e4689af4e28414777a3b5a67a44d3c0fa173f719a273a44427bb11e908e11f692ab4c020ad21f71fa601c29ee5f575dac152d53e53759ad872d6ec7a9c03640fae06c2243ce950de75e4a03e395a3290450891ffa1988b3e5caded58f4e3deaf3d150a9e4b66367044647b766639b5701184b2714e2ac3493a47bbf56d", 0xcf, 0x100}, {&(0x7f0000000300)="c5da16b67d5c825b622023f52d67f52892476605fcb3ce85b5c4abaa47d9a519fab66d43d35b6e69cd778b9966e1716a6fb926633dcfa615fc81dc3bd5a624eaa3e4373f9d04d33c445ca363c39827d382d2b8584bdcf0c4e967f5edc585cdd77c5b50fba24ee9fa4eb2293aa9e1739346d79abdf2d5d50efbee0d9850095f5306d79555a5442acbc151b2cfccf61d87a56daa08bda0", 0x96, 0x1}], 0x108014, &(0x7f00000003c0)={[{@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@seclabel}, {@fsname={'fsname', 0x3d, 'vxfs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@audit}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) ftruncate(r1, 0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x2, 0x3) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = syz_mount_image$affs(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x4, 0x2, &(0x7f0000000680)=[{&(0x7f0000000580)="58774066e83ae3b401e068409fb90b467bf68840971a85304c68a632fec58153cc4cb34363cb5faceb434f6492b3eb05af17cb5d48281f5630f5f6476516c3b0d3e16fc9cf9e318c67fb222109e6751659c4d0cea4c8a546010e92109be7f24c9b1298e1485d7e43ce460a6c80fd24f59a579fef44e6f0655c6502bc34d7c6e5f40cc552935f977c3779ab4c6f0dda1b835481480a8cdfb934677859f6d250a4e59ee411768bc2e66effbca07de8d46534c97838566768c2d98c817559b2362f", 0xc0, 0xff}, {&(0x7f0000000640)="ae9821ffcd", 0x5, 0x4}], 0x2028016, &(0x7f00000006c0)={[{'y\x00'}, {}, {'seclabel'}, {'[]+-'}], [{@obj_role}, {@dont_appraise}]}) mkdirat(r2, &(0x7f0000000700)='./file0\x00', 0x41) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x1122081, &(0x7f0000000540)=ANY=[]) 02:43:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[], 0x0, 0x5b}, 0x20) 02:43:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xbc00, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f00000015c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000016c0)={&(0x7f00000014c0), 0x10, 0x0}, 0x0) [ 1048.994502][T25950] loop0: detected capacity change from 0 to 264192 02:43:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0, 0xfffffffffffffe86}], 0x2000000000000126, 0xffffffff, 0x8001) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$isdn(0x22, 0x2, 0x26) getdents64(r2, &(0x7f0000000200)=""/221, 0xdd) dup2(r4, r5) dup3(r3, r4, 0x80000) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD(r1, 0xc01064c1, &(0x7f00000000c0)={0x0, 0x1}) 02:43:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = socket$kcm(0xa, 0x0, 0x11) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000001c40)="5ea6776a7b82bd7a6f384ad088fa0af52c1bfd85761ab0c0510bf1769549fcff6f5d61ddaf8684cebd94345f8054f8351b0be4232d43ab711f976386d52898c2a2758142e08e02a60d9525d1d58549a0eaa1690f7446fafbb07120e9810f405f176aa34bf429a867272bb051ff7fafbb357232f273b8e73ff48bb3eb197d42bdc2ef647536abbbcc3652a4ab828a678870f4a09d9f9bee2da1a2fc23291b097397f431d0fc566023dce6ad6ec9f5cf5c42e3665ec824cf07c1505bb4f784b2fd12afc9923586", 0xc6}, {&(0x7f0000001d40)="5b2af21f599a1d17c909e91d0e7539a2824dab307ecfa72cf2c594904d21930fa660faa8281abdb79bb5bc0557ab6646b61d1fa70782b1d3cb159b50560e4ca9b30b60490d955f47f827441292586fb12c4488f9220cca02e5ecd19f32adef96218a0bae3bb204265be905eb6697f8a944009190ba7152264252cc90b6559fb9107b587616bcd40b6ba5ae75534272bb944d0b0d5c1df0979f5c544405f793ca7b60dc3a55f8d9d95abee0da3462f3e642cb981d7e062e5d5aef2cd349ab46f69d2fd2cdedde464a129e718f", 0xcc}, {&(0x7f0000001e40)="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", 0x1000}], 0x3, &(0x7f0000003040)=[{0x88, 0x104, 0x7, "81c6710c3d4b67a71b9277c0b5cae3d6f9aa235b842cc97a0b6a1bb13955f2b78dbdc136af279fd6bf3a289728bc0013c051104e20bb65f7e27625d0b2c1a070d696b53f4ffa6feb128ee01fd35e0f59656caef6eceb77b385b4cfd9b5d2f1d9c3ad98cb8081b7c936d71092f694c6cc85d4ff9fd6"}, {0x58, 0x10d, 0x2, "613aa1c3900525b7447d42ec4778e2140606b00f4f2353ab3202d6a7cc24af0c7b07d3dcbf5f57f6175a21cb8a4658cb85877df7eb07568f322fc24d64c3d17e75cd74"}, {0xb0, 0x108, 0x3f, "02613670bddac6c9218474d5130f8799948c1ba7be12c31cedd361d719c9bdef2dde25b05e66cc1c55a9acae0de9ba10f87f4364af860f9153daf969b5564a87b48207105793cc6fd483ac6851bc5f01b5628953f3a53aa719e774c2f48878f68f4f6a0f8bb4513c0db1257322adb62a2e2f5590b8406d0eb9c8d9e27006d8785f73b552f417b769dfcbe2a3ce79871116fa80b2b1eb32cb5e7f5e"}], 0x190}, 0x4) recvmsg$kcm(r1, 0x0, 0x12161) sendmsg$kcm(r0, &(0x7f0000001bc0)={&(0x7f0000001700)=@caif=@dbg={0x25, 0x1, 0x40}, 0x80, &(0x7f0000001a80)=[{0x0}, {&(0x7f0000001780)="a66ed9c928aec5ac49140d8b865a87bd3840423387527ad0e61a11b791dfc62e287ed5f74317139ea54311355833650e289edd42980d72d38d6fe4c1c058d7639fbd5ed0c3ff757ad90436678c26e9b06a97679551db41187d5d39609c9eb9c3ef3788e26213cd6c4f38d4c1152bedaa97b21c449d4dce48ba7226c1471a37f0f249cda706be9b37379477841828171847d6a2e86c18f527200bf2135a25d7b665192fe0afa1ec9662995e212b74202dcbcfb35f9a3cc8a347", 0xb9}, {&(0x7f0000001840)="4a50ad441316cad94a31b239a728daba4a3ff4a46491805f9cc438cf29f4973ddbdd527ddb08421a5f5a13c268b15d24eab5b86f271e072b3899c0043e7212", 0x3f}, {&(0x7f0000001880)="398a54447ac4c6a492971c61ee83fd78ea7783704849dfa618afa7df6185c9692ea04b548a06bbc8354ad114ce6e947407cfbb2f7a2e9f7223aba68dab2c86c3e89a5b49f48e8548b544e06c2db6948c41feb049cb9a2c37abdc3209b6ed4172f4f23081e8c20ce6ff2174e01616ef8cc3b7bcb955b6b750160dc1b34145dd4514f162f6b371a8cb5a5b9ac5bf494d195a2278229bb8332946dd9ef9766666fea2827c6c5d4a6e4827d4509b79079ef39d6dbc15bf", 0xb5}, {&(0x7f0000001940)="0cc645780e646de79c42d93ac208271cfe7d4a2711be980aa403b9195bae71434d36e0d7d899daa1f787e0df9e64e009cfe38ebea5de582d1f1506b19f4e704c4061b108e0216df54fce66552f7128dc8663d3", 0x53}, {0x0}, {&(0x7f0000001a40)}], 0x7, &(0x7f0000003200)=ANY=[@ANYBLOB="90ee4027e09921970ccc209700000000000000020100000000001f1a9fe8cb7f877fa2247cf9e0d6f25f01c788184f3fbd26242359dd1ae301ae26af60a5328afb15a658b78ca444f8210adcbf5bff1a3a248f5a9133f4f57f6056f664b9ef71e858d8d0fa964c86c0626d0d7a84cb575bf1c1f2ba3f5e82c70a7cd631efee81d1000330e3852f36924ef05ce3a2fb0f2a0c958e231b9d1ab500002000000000000000020100005805000073584f0c0e7d17add963380000000000"], 0xb0}, 0x8010) r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001b80), 0x2}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x970000, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000000}, 0x2c) recvmsg$kcm(r0, &(0x7f000000ffc0)={&(0x7f000000ea40)=@xdp, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='cdev_update\x00', r3}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x8e}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:43:46 executing program 2: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:43:46 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x78) [ 1050.197914][T25973] delete_channel: no stack 02:43:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000001200)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "159f21b0f33e08"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000044d80)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "bf5d37cc160e95"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000046d80)={0x0, ""/256, 0x0, 0x0}) ioctl$SNDRV_PCM_IOCTL_START(r0, 0x4142, 0x0) r9 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(r9, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {r7}, {0x0, r8}], 0xff, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000200)={{r7, 0x10000, 0x2a30, 0xcb73, 0x0, 0x3, 0x6, 0x1, 0x401, 0x7, 0xfff, 0xdc, 0x3ff, 0x2, 0x1ff}}) 02:43:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000100)={0x1016, 0x3e83, 0x20, 0x0, 0x4, "3c9e1c7c11f5c08e"}) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 1050.673026][T25986] vxfs: WRONG superblock magic 00000000 at 1 [ 1050.698344][T25986] vxfs: WRONG superblock magic 00000000 at 8 [ 1050.704694][T25986] vxfs: can't find superblock. 02:43:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000001000000180000000200000000000000060000448510"], &(0x7f00000000c0)='GPL\x00', 0x6, 0xff2, &(0x7f00000025c0)=""/4082, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/173, 0xad}], 0x2, 0x4, 0x81) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:47 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x8, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x2, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x35}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd0c}, 0x64) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b605a7", 0x0, 0x8000}, 0x28) [ 1051.343321][T26004] vxfs: WRONG superblock magic 00000000 at 1 [ 1051.411056][T26004] vxfs: WRONG superblock magic 00000000 at 8 [ 1051.417254][T26004] vxfs: can't find superblock. 02:43:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = socket$kcm(0xa, 0x0, 0x11) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='freezer.parent_freezing\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000002e80)={0x0, 0x0, &(0x7f0000002e40)=[{0x0}, {&(0x7f0000001d40)="5b2af21f599a1d17c909e91d0e7539a2824dab307ecfa72cf2c594904d21930fa660faa8281abdb79bb5bc0557ab6646b61d1fa70782b1d3cb159b50560e4ca9b30b60490d955f47f827441292586fb12c4488f9220cca02e5ecd19f32adef96218a0bae3bb204265be905eb6697f8a944009190ba7152264252cc90b6559fb9107b587616bcd40b6ba5ae75534272bb944d0b0d5c1df0979f5c544405f793ca7b60dc3a55f8d9d95abee0da3462f3e642cb981d7e062e5d5aef2cd349ab46f69d2fd2cdedde", 0xc6}], 0x2, &(0x7f0000003040)=[{0x88, 0x104, 0x7, "81c6710c3d4b67a71b9277c0b5cae3d6f9aa235b842cc97a0b6a1bb13955f2b78dbdc136af279fd6bf3a289728bc0013c051104e20bb65f7e27625d0b2c1a070d696b53f4ffa6feb128ee01fd35e0f59656caef6eceb77b385b4cfd9b5d2f1d9c3ad98cb8081b7c936d71092f694c6cc85d4ff9fd6"}, {0x58, 0x10d, 0x2, "613aa1c3900525b7447d42ec4778e2140606b00f4f2353ab3202d6a7cc24af0c7b07d3dcbf5f57f6175a21cb8a4658cb85877df7eb07568f322fc24d64c3d17e75cd74"}], 0xe0}, 0x4) recvmsg$kcm(r1, 0x0, 0x12161) sendmsg$kcm(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f00000003c0)='\bD', 0x2}, {&(0x7f0000001780)="a66ed9c928aec5ac49140d8b865a87bd3840423387527ad0e61a11b791dfc62e287ed5f74317139ea54311355833650e289edd42980d72d38d6fe4c1c058d7639fbd5ed0c3ff757ad90436678c26e9b06a97679551db41187d5d39609c9eb9c3ef3788e26213cd6c4f38d4c1152bedaa97b21c449d4dce48ba7226c1471a37f0f249cda706be9b37379477841828171847d6a2e86c18f527200bf2135a25d7b66519", 0xa2}, {&(0x7f0000001840)="4a50ad441316cad94a31b239a728daba4a3ff4a46491805f9cc438cf29f4973d", 0x20}, {&(0x7f0000001880)="398a54447ac4c6a492971c61ee83fd78ea7783704849dfa618afa7df6185c9692ea04b548a06bbc8354ad114ce6e947407cfbb2f7a2e9f7223aba68dab2c86c3e89a5b49f48e8548b544e06c2db6948c41feb049cb9a2c37abdc3209b6ed4172f4f23081e8c20ce6ff2174e01616ef8cc3b7bcb955b6b750160dc1b34145dd4514f162f6b371a8cb5a5b9ac5bf494d195a2278229bb8332946dd9ef9766666fea2827c6c5d4a6e4827d4", 0xaa}, {0x0}, {&(0x7f00000019c0)="adcaf85c8e76c1ddcbde05b1897ec39116b043c0b28cb596d6c071ffa781c10c819980cda817d6b137bc0c3d299a12c00db9d0d31abb923fd5d07e1938a6690727ec8ca40eb61174db866c5d30391d59f02646e86c8912f448f1e4f4f040943c48c9302d3273b46f1586b7e63b8697", 0x6f}, {0x0}], 0x7, &(0x7f0000003200)=ANY=[@ANYBLOB="90ee4027e09921970ccc209700000000000000020100000000001f1a9fe8cb7f877fa2247cf9e0d6f25f01c788184f3fbd26242359dd1ae301ae26af60a5328afb15a658b78ca444f8210adcbf5bff1a3a248f5a9133f4f57f6056f664b9ef71e858d8d0fa964c86c0626d0d7a84cb575bf1c1f2ba3f5e82c70a7cd631efee81d1000330e3852f36924ef05ce3a2fb0f2a0c958e231b9d1ab500002000000000000000020100005805000073584f0c0e7d17add963380000000000"], 0xb0}, 0x8010) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001b80), 0x2}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x970000, 0x0}, 0x2c) recvmsg$kcm(r0, &(0x7f000000ffc0)={&(0x7f000000ea40)=@xdp, 0x80, &(0x7f000000ff40)=[{&(0x7f000000eac0)=""/255, 0xff}, {&(0x7f000000ebc0)=""/22, 0x16}, {&(0x7f000000ec00)=""/170, 0xaa}, {&(0x7f000000ed80)=""/159, 0x9f}, {&(0x7f000000ef00)=""/35, 0x23}, {&(0x7f000000ef40)=""/4096, 0x1000}], 0x6}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x8e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1051.716754][T26015] vxfs: WRONG superblock magic 00000000 at 1 [ 1051.730643][T26015] vxfs: WRONG superblock magic 00000000 at 8 [ 1051.736940][T26015] vxfs: can't find superblock. [ 1051.767963][T26018] vxfs: WRONG superblock magic 00000000 at 1 [ 1051.812808][T26018] vxfs: WRONG superblock magic 00000000 at 8 [ 1051.819361][T26018] vxfs: can't find superblock. 02:43:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x18}, 0x93) 02:43:48 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x7f, 0x15, 0xf1, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa580, 0x3, 0x4, 0x4, 0xfff, 0x80000000, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x25, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) sendmsg$tipc(r0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6L\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 02:43:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '!\x00'}, &(0x7f0000000140)=""/100, 0x64) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000200)=0x4) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) shmget$private(0x0, 0x1000, 0x1a, &(0x7f00007a6000/0x1000)=nil) 02:43:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$isdn(0x22, 0x2, 0x26) dup2(r2, r3) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x40000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/keycreate\x00') mmap(&(0x7f0000412000/0x2000)=nil, 0x2000, 0x0, 0x13, r5, 0xf9232000) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) ioctl$RTC_VL_CLR(r4, 0x7014) 02:43:48 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:49 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000800)={&(0x7f0000000040)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}, 0x0) [ 1052.995178][T26047] vxfs: WRONG superblock magic 00000000 at 1 [ 1053.005068][T26047] vxfs: WRONG superblock magic 00000000 at 8 [ 1053.011466][T26047] vxfs: can't find superblock. [ 1053.036386][T26049] delete_channel: no stack [ 1053.087178][T26049] vxfs: WRONG superblock magic 00000000 at 1 [ 1053.158131][T26049] vxfs: WRONG superblock magic 00000000 at 8 [ 1053.164694][T26049] vxfs: can't find superblock. [ 1053.223860][T26057] vxfs: WRONG superblock magic 00000000 at 1 [ 1053.248578][T26057] vxfs: WRONG superblock magic 00000000 at 8 [ 1053.255270][T26057] vxfs: can't find superblock. [ 1053.365443][T26046] delete_channel: no stack 02:43:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f00000015c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:43:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000f40)={0x9, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 02:43:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000000c0)={0x2}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(0xffffffffffffffff, 0x40045109, &(0x7f0000000240)=0x101) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f000050d000/0x3000)=nil, 0x3000, 0x180000b, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0x4, 0x100) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x120000, 0x5233b0e5b6096173) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200), 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000280)={0x1, 0x100, 0x2, 0x1f, 0xe6, 0x8}) preadv(r4, &(0x7f0000000280), 0x0, 0x4, 0x4) ioctl$RTC_EPOCH_READ(r4, 0x8004700d, &(0x7f0000000180)) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000100)={[{0x9, 0x20, 0x6, 0x9, 0x27, 0x6, 0x1, 0x6, 0x7, 0x0, 0x81, 0x81, 0x6}, {0x3, 0x7, 0xfd, 0x82, 0x7, 0x0, 0x54, 0x8, 0x3, 0x0, 0x6, 0x0, 0xc6}, {0x3, 0x1ff, 0xf6, 0x81, 0x2, 0x0, 0x5, 0x5, 0x20, 0x40, 0x7f, 0x4, 0x9}], 0x5}) [ 1053.690598][T26045] device wlan1 entered promiscuous mode [ 1053.711458][T26067] device wlan1 left promiscuous mode 02:43:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$isdn(0x22, 0x2, 0x26) dup2(r2, r3) preadv(r2, &(0x7f0000001600)=[{&(0x7f0000000240)=""/115, 0x73}, {&(0x7f00000002c0)=""/206, 0xce}, {&(0x7f00000003c0)=""/165, 0xa5}, {&(0x7f0000000480)=""/184, 0xb8}, {&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x6, 0x101, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) socket(0x22, 0x2, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRES32=r4, @ANYBLOB="defff10000ff04000c00031b14000b0007100000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000020}, 0x4004004) [ 1054.301026][T26066] device wlan1 entered promiscuous mode 02:43:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2dd416605493465f, 0x1}, 0x40) [ 1054.542181][T26083] delete_channel: no stack 02:43:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f000000f2c0)={0x0, 0x0, 0x0}, 0x0) [ 1054.690033][T26083] vxfs: WRONG superblock magic 00000000 at 1 [ 1054.696882][T26083] vxfs: WRONG superblock magic 00000000 at 8 [ 1054.703236][T26083] vxfs: can't find superblock. 02:43:51 executing program 1: ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f00000000c0)={0x20000000, 0x100, "ece706616077ba5b0f6da48db690d149a8f5de5367a3624afaf9879abadaf64f", 0xfff, 0x4, 0x100000000, 0x6, 0xfff, 0x8000, 0x20000000, 0x1, [0xfff, 0x80, 0x4, 0x200]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x6a80, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000132000/0x3000)=nil, 0x3000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000001c0)=0x2) r2 = openat$btrfs_control(0xffffff9c, &(0x7f0000000340), 0x20042, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000380)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r1) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040044}, 0x20008800) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f00000003c0)) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0x1}, 0x40) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)="7093a0", &(0x7f0000000280), 0x7, r1}, 0x38) openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5cdd0220, 0x1, 0x18, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, 0x10080, 0x100000001, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e980)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f000000e9c0)) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000040)={0x0, &(0x7f0000000200)=""/163, &(0x7f00000002c0), &(0x7f0000000080), 0x3, r1}, 0x38) [ 1054.756379][T26086] delete_channel: no stack 02:43:51 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x5, [@struct={0x4, 0x4, 0x0, 0x4, 0x1, 0xf5, [{0xa, 0x0, 0x4}, {0x7, 0x0, 0x2}, {0xc, 0x1, 0x348749a3}, {0xd, 0x1, 0x4}]}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x62, 0x0, 0x63, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x1}}, @fwd={0x7}, @restrict={0xf, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x9}}]}, {0x0, [0x6f, 0x61, 0x5f]}}, &(0x7f0000000180)=""/28, 0xb1, 0x1c, 0x1}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000200)=""/219, 0xdb}], 0x2, 0x5, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) [ 1055.141278][T26094] vxfs: WRONG superblock magic 00000000 at 1 [ 1055.148353][T26094] vxfs: WRONG superblock magic 00000000 at 8 [ 1055.154767][T26094] vxfs: can't find superblock. 02:43:51 executing program 3: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) gettid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$ITER_CREATE(0x21, 0x0, 0x0) 02:43:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000900)={&(0x7f0000000040)=@phonet, 0x80, 0x0}, 0x0) 02:43:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0), 0x70cb, 0x2) unlinkat(r2, &(0x7f0000000100)='./file1\x00', 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) syz_mount_image$adfs(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x1, 0x4, &(0x7f0000000300)=[{&(0x7f0000000200)="f7f91089", 0x4, 0x101}, {&(0x7f0000000240)="7bec7525261290a56964527ac667055ff41415c7f84c1cbb8830bbd8f10887", 0x1f}, {&(0x7f0000000280)="bf139f29ad5243e7e2a14ddc3eda69cac59621c970b6d61f1453117bd869f733c6db97713da96ce9", 0x28, 0x7fffffff}, {&(0x7f00000002c0)="6a61a76d12d94cc49d4d5fffa323576e646b752d4ba57d40107582f688ed61e649260147a4011a", 0x27, 0x3}], 0x1089420, &(0x7f0000000880)={[{'/dev/audio#\x00'}, {'{$'}, {}, {'/dev/zero\x00'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<', r3}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, '/dev/audio#\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@measure}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) [ 1055.833191][T26111] vxfs: WRONG superblock magic 00000000 at 1 [ 1055.852963][T26111] vxfs: WRONG superblock magic 00000000 at 8 [ 1055.859396][T26111] vxfs: can't find superblock. [ 1055.954917][T26116] vxfs: WRONG superblock magic 00000000 at 1 [ 1055.985777][T26116] vxfs: WRONG superblock magic 00000000 at 8 [ 1055.992225][T26116] vxfs: can't find superblock. 02:43:52 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xa, 0x0, 0x700) [ 1056.185968][T26125] vxfs: WRONG superblock magic 00000000 at 1 02:43:52 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, 0x0, 0x0) [ 1056.276497][T26125] vxfs: WRONG superblock magic 00000000 at 8 [ 1056.284287][T26125] vxfs: can't find superblock. 02:43:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) openat$vsock(0xffffff9c, &(0x7f00000003c0), 0x8000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) fremovexattr(r0, &(0x7f0000000380)=@known='system.posix_acl_access\x00') syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000200)="01f03e252e6fb432042db24156597ecbc9bb406fd3a7d4520dab339f5bde1f22bf09875ffa658e9b957e2090348cabaa70ba9aae6703f4d39b142492cae49372825066c3bd4fd1a39ae36d8ecb12a341d94500832ca78a92c50145b443575e5d345c28884dddfb8af2479b28bd587c29310825128b7bceaab4a7bfc127a5d175d7e089be5e4294acf8547d61c07ac4de5c10f4ec88409299d46d5b087b984fe05f1f119ebeb77c73653a15bbd691552a9efbecabe810a5b062e9fbd1e6e2434b3f61e4cbcb5d4c35f982383eb921673ce5e448124203", 0xd6, 0x6}, {&(0x7f0000000100)="18ab0fbef42daa9d1175fe3bd9e4c0fd69bf19a48e7290bdd7985a9706e2a119ea24fde8577dc086563068ab98c8c51c06c298a5eab1e4549a2763a387c389983bda7122cce59d176dd0c7d370746abbc86f4c1dcbfb44c682b6d5e60a609553dc1687410f4c082da63589b1cd421854a4087cff5e8e00dea89007d5f29801875e10c00103e84fc764d61b4f7d8ae727f05197633638cf", 0x97, 0x1}, {&(0x7f0000000300)="1a5256797c75de2423b682f5f2353f7a31e214b30a68b82f503930f9c7e451215da64cd61570a8a334387589ddcb60382b4cbda44771e6dee5881b2c4dba2ca97a6b77", 0x43, 0x8}], 0x8c0805, &(0x7f0000000540)=ANY=[]) 02:43:52 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1056.390321][T26131] loop1: detected capacity change from 0 to 264192 02:43:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="e0", 0x1}, {&(0x7f0000000180)='W', 0x1}], 0x3}, 0x0) 02:43:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, 0x0, 0x2a}, 0x20) 02:43:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000090000/0x2000)=nil, 0x1000) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:53 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001640)={0xffffffffffffffff}, 0x4) 02:43:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000300)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) 02:43:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$isdn(0x22, 0x2, 0x26) dup2(r2, r3) fsetxattr(r2, &(0x7f00000000c0)=@known='user.incfs.size\x00', &(0x7f0000000100)='\x00', 0x1, 0x3) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x1b) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) 02:43:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e720dffff81", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x1, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) close(0xffffffffffffffff) [ 1057.725542][T26158] vxfs: WRONG superblock magic 00000000 at 1 [ 1057.810144][T26158] vxfs: WRONG superblock magic 00000000 at 8 [ 1057.816546][T26158] vxfs: can't find superblock. 02:43:54 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x23, 0x0, 0x0) 02:43:54 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8fd1dd81c16ea481}, 0x60004) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 02:43:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x585000, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) dup3(r0, r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) close(0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x4c, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x401, 0x52}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 1058.225315][T26172] delete_channel: no stack [ 1058.288477][T26173] hsr0: VLAN not yet supported [ 1058.289199][T26173] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1058.301142][T26173] hsr_slave_1: hsr_addr_subst_dest: Unknown node 02:43:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x0) [ 1058.380133][T26172] vxfs: WRONG superblock magic 00000000 at 1 [ 1058.387341][T26172] vxfs: WRONG superblock magic 00000000 at 8 [ 1058.393752][T26172] vxfs: can't find superblock. [ 1058.472489][T26181] delete_channel: no stack [ 1058.490044][T26173] ===================================================== [ 1058.497052][T26173] BUG: KMSAN: uninit-value in hsr_fill_frame_info+0x521/0x6a0 [ 1058.498939][T26173] CPU: 0 PID: 26173 Comm: syz-executor.2 Tainted: G W 5.12.0-rc6-syzkaller #0 [ 1058.498939][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.498939][T26173] Call Trace: [ 1058.498939][T26173] dump_stack+0x24c/0x2e0 [ 1058.498939][T26173] kmsan_report+0xfb/0x1e0 [ 1058.498939][T26173] __msan_warning+0x5c/0xa0 [ 1058.498939][T26173] hsr_fill_frame_info+0x521/0x6a0 [ 1058.498939][T26173] ? hsr_drop_frame+0x2a0/0x2a0 [ 1058.550482][T26173] hsr_forward_skb+0xc4f/0x27f0 [ 1058.550482][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.550482][T26173] hsr_dev_xmit+0x133/0x230 [ 1058.550482][T26173] ? is_hsr_master+0xb0/0xb0 [ 1058.550482][T26173] xmit_one+0x2b6/0x760 [ 1058.550482][T26173] __dev_queue_xmit+0x3432/0x4600 [ 1058.550482][T26173] dev_queue_xmit+0x4b/0x60 [ 1058.550482][T26173] __bpf_redirect+0x1461/0x16b0 [ 1058.550482][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.550482][T26173] bpf_clone_redirect+0x4a1/0x660 [ 1058.550482][T26173] ___bpf_prog_run+0x2b78/0xb950 [ 1058.550482][T26173] ? bpf_csum_level+0x760/0x760 [ 1058.550482][T26173] __bpf_prog_run512+0x12e/0x190 [ 1058.550482][T26173] ? kmsan_internal_set_origin+0x85/0xc0 [ 1058.550482][T26173] ? __msan_instrument_asm_store+0x22/0x130 [ 1058.550482][T26173] ? __msan_get_context_state+0x9/0x20 [ 1058.550482][T26173] ? irqentry_exit+0x12/0x50 [ 1058.550482][T26173] ? sysvec_apic_timer_interrupt+0x86/0xf0 [ 1058.550482][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.550482][T26173] ? kmsan_internal_set_origin+0x85/0xc0 [ 1058.550482][T26173] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1058.550482][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.550482][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.550482][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1058.550482][T26173] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1058.550482][T26173] ? ktime_get+0x390/0x470 [ 1058.550482][T26173] ? kmsan_get_metadata+0x4f/0x180 [ 1058.550482][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1058.550482][T26173] ? __bpf_prog_run480+0x190/0x190 [ 1058.550482][T26173] bpf_test_run+0x53f/0xe60 [ 1058.550482][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1058.709988][T26173] bpf_prog_test_run_skb+0x1914/0x3500 [ 1058.709988][T26173] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1058.709988][T26173] __do_sys_bpf+0xbe6f/0x1aba0 [ 1058.709988][T26173] ? kmsan_internal_set_origin+0x85/0xc0 [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] ? kmsan_internal_check_memory+0xb5/0x520 [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 02:43:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e655800", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1058.709988][T26173] __se_sys_bpf+0x8e/0xa0 [ 1058.709988][T26173] __ia32_sys_bpf+0x4a/0x70 [ 1058.709988][T26173] __do_fast_syscall_32+0x127/0x180 [ 1058.709988][T26173] do_fast_syscall_32+0x6a/0xc0 [ 1058.709988][T26173] do_SYSENTER_32+0x73/0x90 [ 1058.709988][T26173] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1058.809522][T26173] RIP: 0023:0xf7f62549 [ 1058.809522][T26173] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1058.809522][T26173] RSP: 002b:00000000f555c5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1058.809522][T26173] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1058.809522][T26173] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1058.809522][T26173] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1058.809522][T26173] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1058.809522][T26173] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1058.809522][T26173] [ 1058.809522][T26173] Uninit was created at: [ 1058.809522][T26173] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1058.809522][T26173] kmsan_slab_alloc+0x8e/0xe0 [ 1058.809522][T26173] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1058.809522][T26173] pskb_expand_head+0x25e/0x1e20 [ 1058.809522][T26173] skb_ensure_writable+0x4cf/0x590 [ 1058.809522][T26173] bpf_clone_redirect+0x25d/0x660 [ 1058.809522][T26173] ___bpf_prog_run+0x2b78/0xb950 [ 1058.809522][T26173] __bpf_prog_run512+0x12e/0x190 [ 1058.809522][T26173] bpf_test_run+0x53f/0xe60 [ 1058.809522][T26173] bpf_prog_test_run_skb+0x1914/0x3500 [ 1058.809522][T26173] __do_sys_bpf+0xbe6f/0x1aba0 [ 1058.809522][T26173] __se_sys_bpf+0x8e/0xa0 [ 1058.809522][T26173] __ia32_sys_bpf+0x4a/0x70 [ 1058.809522][T26173] __do_fast_syscall_32+0x127/0x180 [ 1058.809522][T26173] do_fast_syscall_32+0x6a/0xc0 [ 1058.809522][T26173] do_SYSENTER_32+0x73/0x90 [ 1058.809522][T26173] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1058.809522][T26173] ===================================================== [ 1058.809522][T26173] Disabling lock debugging due to kernel taint [ 1058.992247][T26173] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1058.999462][T26173] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1059.083654][T26176] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1059.090828][T26176] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1059.136465][T26176] ===================================================== [ 1059.138938][T26176] BUG: KMSAN: uninit-value in hsr_fill_frame_info+0x521/0x6a0 [ 1059.138938][T26176] CPU: 0 PID: 26176 Comm: syz-executor.2 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1059.138938][T26176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.138938][T26176] Call Trace: [ 1059.138938][T26176] dump_stack+0x24c/0x2e0 [ 1059.138938][T26176] kmsan_report+0xfb/0x1e0 [ 1059.138938][T26176] __msan_warning+0x5c/0xa0 [ 1059.138938][T26176] hsr_fill_frame_info+0x521/0x6a0 [ 1059.138938][T26176] ? hsr_drop_frame+0x2a0/0x2a0 [ 1059.138938][T26176] hsr_forward_skb+0xc4f/0x27f0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] hsr_dev_xmit+0x133/0x230 [ 1059.138938][T26176] ? is_hsr_master+0xb0/0xb0 [ 1059.138938][T26176] xmit_one+0x2b6/0x760 [ 1059.138938][T26176] __dev_queue_xmit+0x3432/0x4600 [ 1059.138938][T26176] dev_queue_xmit+0x4b/0x60 [ 1059.138938][T26176] __bpf_redirect+0x1461/0x16b0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] bpf_clone_redirect+0x4a1/0x660 [ 1059.138938][T26176] ___bpf_prog_run+0x2b78/0xb950 [ 1059.138938][T26176] ? bpf_csum_level+0x760/0x760 [ 1059.138938][T26176] __bpf_prog_run512+0x12e/0x190 [ 1059.138938][T26176] ? kmsan_internal_set_origin+0x85/0xc0 [ 1059.138938][T26176] ? __msan_instrument_asm_store+0x22/0x130 [ 1059.138938][T26176] ? __msan_get_context_state+0x9/0x20 [ 1059.138938][T26176] ? irqentry_exit+0x12/0x50 [ 1059.138938][T26176] ? sysvec_apic_timer_interrupt+0x86/0xf0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_internal_set_origin+0x85/0xc0 [ 1059.138938][T26176] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1059.138938][T26176] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1059.138938][T26176] ? ktime_get+0x390/0x470 [ 1059.138938][T26176] ? kmsan_get_metadata+0x4f/0x180 [ 1059.138938][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1059.138938][T26176] ? __bpf_prog_run480+0x190/0x190 [ 1059.138938][T26176] bpf_test_run+0x53f/0xe60 [ 1059.138938][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1059.138938][T26176] bpf_prog_test_run_skb+0x1914/0x3500 [ 1059.138938][T26176] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1059.138938][T26176] __do_sys_bpf+0xbe6f/0x1aba0 [ 1059.138938][T26176] ? kmsan_internal_set_origin+0x85/0xc0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_internal_check_memory+0xb5/0x520 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1059.138938][T26176] __se_sys_bpf+0x8e/0xa0 [ 1059.138938][T26176] __ia32_sys_bpf+0x4a/0x70 [ 1059.138938][T26176] __do_fast_syscall_32+0x127/0x180 [ 1059.138938][T26176] do_fast_syscall_32+0x6a/0xc0 [ 1059.138938][T26176] do_SYSENTER_32+0x73/0x90 [ 1059.138938][T26176] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1059.138938][T26176] RIP: 0023:0xf7f62549 [ 1059.138938][T26176] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1059.138938][T26176] RSP: 002b:00000000f553b5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1059.138938][T26176] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1059.138938][T26176] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1059.138938][T26176] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1059.138938][T26176] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1059.138938][T26176] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1059.138938][T26176] [ 1059.138938][T26176] Uninit was created at: [ 1059.138938][T26176] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1059.138938][T26176] kmsan_slab_alloc+0x8e/0xe0 [ 1059.138938][T26176] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1059.138938][T26176] pskb_expand_head+0x25e/0x1e20 [ 1059.138938][T26176] skb_ensure_writable+0x4cf/0x590 [ 1059.138938][T26176] bpf_clone_redirect+0x25d/0x660 [ 1059.138938][T26176] ___bpf_prog_run+0x2b78/0xb950 [ 1059.138938][T26176] __bpf_prog_run512+0x12e/0x190 [ 1059.138938][T26176] bpf_test_run+0x53f/0xe60 [ 1059.138938][T26176] bpf_prog_test_run_skb+0x1914/0x3500 [ 1059.138938][T26176] __do_sys_bpf+0xbe6f/0x1aba0 [ 1059.138938][T26176] __se_sys_bpf+0x8e/0xa0 [ 1059.138938][T26176] __ia32_sys_bpf+0x4a/0x70 [ 1059.138938][T26176] __do_fast_syscall_32+0x127/0x180 [ 1059.138938][T26176] do_fast_syscall_32+0x6a/0xc0 [ 1059.138938][T26176] do_SYSENTER_32+0x73/0x90 [ 1059.138938][T26176] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1059.138938][T26176] ===================================================== [ 1059.631217][T26176] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1059.637842][T26176] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1059.799158][T26187] vxfs: WRONG superblock magic 00000000 at 1 [ 1059.829481][T26187] vxfs: WRONG superblock magic 00000000 at 8 [ 1059.835793][T26187] vxfs: can't find superblock. 02:43:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fanotify_mark(r1, 0x48, 0xa, r1, &(0x7f00000000c0)='\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = inotify_init1(0x80000) splice(r1, &(0x7f0000000100)=0x80, r2, &(0x7f0000000140)=0x7f, 0x7, 0x6) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$isdn(0x22, 0x2, 0x26) dup2(r3, r4) r5 = socket$pptp(0x18, 0x1, 0x2) fcntl$setown(r0, 0x8, 0x0) fcntl$getown(r4, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81e8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c09425, &(0x7f0000000440)={"c70e7aa9a7ba2b0e105324fe845fc075", 0x0, 0x0, {0x4, 0x81}, {0x0, 0x7}, 0x80000000, [0x1, 0x8, 0x7, 0x7fff, 0x2, 0x9, 0x9, 0x6, 0x4df, 0x4, 0x3, 0xb464, 0xe5, 0x81, 0x9, 0x1]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c09425, &(0x7f0000000500)={"f495d1aaef793ea27093049bdfe5c003", r6, r7, {0xf5, 0xd7}, {0x7, 0x5}, 0x7, [0x24f, 0xfffffffffffffff8, 0x1, 0xffffffffffffb996, 0xe83f, 0x8, 0x238, 0x5, 0x7, 0x6, 0x3, 0xffffffffffffff7f, 0x3, 0x7, 0x9, 0x8]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) ioctl$RTC_PLL_SET(r1, 0x401c7012, &(0x7f0000000180)={0xfffffff9, 0x0, 0x8000, 0x4, 0xd088, 0x5, 0x7}) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 1059.986017][T26190] vxfs: WRONG superblock magic 00000000 at 1 [ 1060.086543][T26190] vxfs: WRONG superblock magic 00000000 at 8 [ 1060.094090][T26190] vxfs: can't find superblock. 02:43:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = signalfd(r0, &(0x7f00000000c0)={[0x9, 0x200]}, 0x8) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000540)=ANY=[]) [ 1060.401913][T26200] delete_channel: no stack [ 1060.464186][T26202] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1060.470977][T26202] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1060.528768][T26202] ===================================================== [ 1060.528924][T26202] BUG: KMSAN: uninit-value in hsr_get_node+0x45d/0xba0 [ 1060.539240][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1060.539240][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1060.539240][T26202] Call Trace: [ 1060.539240][T26202] dump_stack+0x24c/0x2e0 [ 1060.539240][T26202] kmsan_report+0xfb/0x1e0 [ 1060.539240][T26202] __msan_warning+0x5c/0xa0 [ 1060.539240][T26202] hsr_get_node+0x45d/0xba0 [ 1060.539240][T26202] hsr_forward_skb+0x9c2/0x27f0 [ 1060.539240][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.539240][T26202] hsr_dev_xmit+0x133/0x230 [ 1060.596671][T26202] ? is_hsr_master+0xb0/0xb0 [ 1060.596671][T26202] xmit_one+0x2b6/0x760 [ 1060.604226][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1060.604226][T26202] dev_queue_xmit+0x4b/0x60 [ 1060.604226][T26202] __bpf_redirect+0x1461/0x16b0 [ 1060.604226][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.604226][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1060.629214][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1060.629214][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1060.629214][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1060.629214][T26202] ? bpf_csum_level+0x760/0x760 [ 1060.629214][T26202] __bpf_prog_run512+0x12e/0x190 [ 1060.659246][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.660179][T26200] vxfs: WRONG superblock magic 00000000 at 1 [ 1060.659246][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1060.659246][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1060.659246][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.659246][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.679918][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.679918][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.679918][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.679918][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1060.713066][T26200] vxfs: WRONG superblock magic 00000000 at 8 [ 1060.679918][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.679918][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.679918][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.679918][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1060.679918][T26202] ? ktime_get+0x390/0x470 [ 1060.679918][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1060.679918][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.679918][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1060.679918][T26202] bpf_test_run+0x53f/0xe60 [ 1060.679918][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.679918][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1060.679918][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1060.723342][T26200] vxfs: can't find superblock. [ 1060.679918][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1060.679918][T26202] ? __msan_get_context_state+0x9/0x20 [ 1060.794813][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.794813][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1060.794813][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.794813][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.794813][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.794813][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.794813][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1060.840018][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.840018][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1060.840018][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.840018][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1060.840018][T26202] __se_sys_bpf+0x8e/0xa0 [ 1060.840018][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1060.840018][T26202] __do_fast_syscall_32+0x127/0x180 [ 1060.840018][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1060.840018][T26202] do_SYSENTER_32+0x73/0x90 [ 1060.840018][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1060.840018][T26202] RIP: 0023:0xf7ff4549 [ 1060.840018][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1060.840018][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1060.920298][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1060.920298][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1060.920298][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1060.920298][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1060.920298][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1060.920298][T26202] [ 1060.920298][T26202] Uninit was created at: [ 1060.920298][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1060.920298][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1060.920298][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1060.920298][T26202] pskb_expand_head+0x25e/0x1e20 [ 1060.920298][T26202] skb_ensure_writable+0x4cf/0x590 [ 1060.920298][T26202] bpf_clone_redirect+0x25d/0x660 [ 1060.920298][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1060.920298][T26202] __bpf_prog_run512+0x12e/0x190 [ 1060.920298][T26202] bpf_test_run+0x53f/0xe60 [ 1060.920298][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1060.920298][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1060.920298][T26202] __se_sys_bpf+0x8e/0xa0 [ 1060.920298][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1060.920298][T26202] __do_fast_syscall_32+0x127/0x180 [ 1060.920298][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1060.920298][T26202] do_SYSENTER_32+0x73/0x90 [ 1060.920298][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1060.920298][T26202] ===================================================== [ 1061.064137][T26202] ===================================================== [ 1061.071072][T26202] BUG: KMSAN: uninit-value in hsr_get_node+0x498/0xba0 [ 1061.074022][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1061.074022][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.074022][T26202] Call Trace: [ 1061.074022][T26202] dump_stack+0x24c/0x2e0 [ 1061.074022][T26202] kmsan_report+0xfb/0x1e0 [ 1061.109736][T26202] __msan_warning+0x5c/0xa0 [ 1061.109736][T26202] hsr_get_node+0x498/0xba0 [ 1061.109736][T26202] hsr_forward_skb+0x9c2/0x27f0 [ 1061.109736][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.109736][T26202] hsr_dev_xmit+0x133/0x230 [ 1061.109736][T26202] ? is_hsr_master+0xb0/0xb0 [ 1061.109736][T26202] xmit_one+0x2b6/0x760 [ 1061.109736][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1061.109736][T26202] dev_queue_xmit+0x4b/0x60 [ 1061.149865][T26202] __bpf_redirect+0x1461/0x16b0 [ 1061.149865][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.149865][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1061.149865][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1061.149865][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1061.149865][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1061.149865][T26202] ? bpf_csum_level+0x760/0x760 [ 1061.149865][T26202] __bpf_prog_run512+0x12e/0x190 [ 1061.149865][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.149865][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1061.149865][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1061.149865][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.149865][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.149865][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.149865][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.149865][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.149865][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.240218][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1061.240218][T26202] ? ktime_get+0x390/0x470 [ 1061.240218][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1061.240218][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.240218][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1061.240218][T26202] bpf_test_run+0x53f/0xe60 [ 1061.240218][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.240218][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1061.240218][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1061.240218][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1061.240218][T26202] ? __msan_get_context_state+0x9/0x20 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.240218][T26202] __se_sys_bpf+0x8e/0xa0 [ 1061.240218][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1061.240218][T26202] __do_fast_syscall_32+0x127/0x180 [ 1061.240218][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1061.240218][T26202] do_SYSENTER_32+0x73/0x90 [ 1061.240218][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1061.240218][T26202] RIP: 0023:0xf7ff4549 [ 1061.240218][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1061.240218][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1061.240218][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1061.240218][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1061.240218][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1061.240218][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1061.240218][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1061.240218][T26202] [ 1061.240218][T26202] Uninit was created at: [ 1061.240218][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1061.240218][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1061.240218][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1061.240218][T26202] pskb_expand_head+0x25e/0x1e20 [ 1061.240218][T26202] skb_ensure_writable+0x4cf/0x590 [ 1061.240218][T26202] bpf_clone_redirect+0x25d/0x660 [ 1061.240218][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1061.240218][T26202] __bpf_prog_run512+0x12e/0x190 [ 1061.240218][T26202] bpf_test_run+0x53f/0xe60 [ 1061.240218][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1061.240218][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1061.240218][T26202] __se_sys_bpf+0x8e/0xa0 [ 1061.240218][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1061.240218][T26202] __do_fast_syscall_32+0x127/0x180 [ 1061.240218][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1061.240218][T26202] do_SYSENTER_32+0x73/0x90 [ 1061.240218][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1061.240218][T26202] ===================================================== [ 1061.582476][T26202] ===================================================== [ 1061.589492][T26202] BUG: KMSAN: uninit-value in hsr_forward_skb+0x22d7/0x27f0 [ 1061.592352][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1061.600838][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.600838][T26202] Call Trace: [ 1061.600838][T26202] dump_stack+0x24c/0x2e0 [ 1061.600838][T26202] kmsan_report+0xfb/0x1e0 [ 1061.600838][T26202] __msan_warning+0x5c/0xa0 [ 1061.600838][T26202] hsr_forward_skb+0x22d7/0x27f0 [ 1061.600838][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.600838][T26202] hsr_dev_xmit+0x133/0x230 [ 1061.600838][T26202] ? is_hsr_master+0xb0/0xb0 [ 1061.600838][T26202] xmit_one+0x2b6/0x760 [ 1061.600838][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1061.600838][T26202] dev_queue_xmit+0x4b/0x60 [ 1061.600838][T26202] __bpf_redirect+0x1461/0x16b0 [ 1061.600838][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.600838][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1061.600838][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1061.600838][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1061.600838][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1061.600838][T26202] ? bpf_csum_level+0x760/0x760 [ 1061.600838][T26202] __bpf_prog_run512+0x12e/0x190 [ 1061.707888][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.707888][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1061.707888][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1061.707888][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.707888][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.707888][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.707888][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.707888][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.707888][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.758560][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1061.758560][T26202] ? ktime_get+0x390/0x470 [ 1061.758560][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1061.758560][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.758560][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1061.758560][T26202] bpf_test_run+0x53f/0xe60 [ 1061.758560][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.758560][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1061.758560][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1061.758560][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1061.758560][T26202] ? __msan_get_context_state+0x9/0x20 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1061.758560][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.758560][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1061.879482][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.879482][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1061.879482][T26202] __se_sys_bpf+0x8e/0xa0 [ 1061.879482][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1061.879482][T26202] __do_fast_syscall_32+0x127/0x180 [ 1061.879482][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1061.879482][T26202] do_SYSENTER_32+0x73/0x90 [ 1061.879482][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1061.879482][T26202] RIP: 0023:0xf7ff4549 [ 1061.879482][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1061.879482][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1061.879482][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1061.879482][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1061.879482][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1061.879482][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1061.879482][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1061.990075][T26202] [ 1061.990075][T26202] Uninit was created at: [ 1061.990075][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1061.990075][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1061.990075][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1061.990075][T26202] pskb_expand_head+0x25e/0x1e20 [ 1061.990075][T26202] skb_ensure_writable+0x4cf/0x590 [ 1061.990075][T26202] bpf_clone_redirect+0x25d/0x660 [ 1061.990075][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1061.990075][T26202] __bpf_prog_run512+0x12e/0x190 [ 1061.990075][T26202] bpf_test_run+0x53f/0xe60 [ 1061.990075][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1061.990075][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1061.990075][T26202] __se_sys_bpf+0x8e/0xa0 [ 1061.990075][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1061.990075][T26202] __do_fast_syscall_32+0x127/0x180 [ 1061.990075][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1061.990075][T26202] do_SYSENTER_32+0x73/0x90 [ 1061.990075][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1062.085037][T26202] ===================================================== [ 1062.097030][T26202] ===================================================== [ 1062.103977][T26202] BUG: KMSAN: uninit-value in hsr_fill_frame_info+0x521/0x6a0 [ 1062.106983][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1062.106983][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1062.106983][T26202] Call Trace: [ 1062.106983][T26202] dump_stack+0x24c/0x2e0 [ 1062.106983][T26202] kmsan_report+0xfb/0x1e0 [ 1062.106983][T26202] __msan_warning+0x5c/0xa0 [ 1062.106983][T26202] hsr_fill_frame_info+0x521/0x6a0 [ 1062.106983][T26202] ? hsr_drop_frame+0x2a0/0x2a0 [ 1062.106983][T26202] hsr_forward_skb+0xc4f/0x27f0 [ 1062.106983][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.106983][T26202] hsr_dev_xmit+0x133/0x230 [ 1062.106983][T26202] ? is_hsr_master+0xb0/0xb0 [ 1062.106983][T26202] xmit_one+0x2b6/0x760 [ 1062.106983][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1062.106983][T26202] dev_queue_xmit+0x4b/0x60 [ 1062.106983][T26202] __bpf_redirect+0x1461/0x16b0 [ 1062.106983][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.106983][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1062.106983][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1062.106983][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1062.106983][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1062.106983][T26202] ? bpf_csum_level+0x760/0x760 [ 1062.106983][T26202] __bpf_prog_run512+0x12e/0x190 [ 1062.106983][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.106983][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1062.106983][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1062.106983][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.106983][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.106983][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.106983][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.269161][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.269161][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 02:43:58 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb05a) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x47ff}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0}, 0x80) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000011200)={0x0, 0x0, &(0x7f00000111c0)={&(0x7f0000000780)=@newtaction={0x48, 0x32, 0x901, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c65302063707561636374ec75736167655f011b278fa4180fa03f20232920637075616363742e75736167655f616c6c0020637075616363742e75736167655f616c6c000ac74d5094a4f4a7d5dd2c934150fe4f2e246dcfe2571b6f4f82205e09000000338ed30dddfd88487c6e40d0863bbc4dc4f2a3f2cc6180b5e09b63d7c01a3898242018bcb70775aae6905ce65354464f5c83dbd20c4081fefbff785bd5f7195aad0365e15bcd667ab420436cbd528919a24928407115ad77b58788ef9c71c3dc9eab8f54b880e68b8ab31cc1ac67678c990c3dbe6bed1380e49e38b76dee8d39589b24323cb16f77e0e4a21dae92f76a3d3f208edf98c99b8e6c173aa28d3cba2231e299891d951295d92bffe431b7cef84550e5cc7bba1c2fc5da562cebb214e16d4bab350e2be1fc6cfeaea5374476f8eaca816f8ceb6ea583879289330a567cb5455307bd13d66ab0f586017faaa77266d7750b1bfdd9120957cac33b3c0ada84f031361ecfa7efc00f65eff6839bbb6228b5652a0f326c55d70117b5998365981b139671ddf16a345628d7b0e1a716af6bc6765b43b0f0ae00d9944c8654a56c1c4de807b56a50f448debe78ee6e63f0e690a75224524c03d3e8d0296cf964d915db51b4e11ce65aece67c5aa9b6b9fb3ae6889915f9e60b2e3713134b09df820a0a1ffee8dd272985df3afca8b423a9fe81bdd0eb4f071d5c3a083cc6aea6d55045d9075347f03783e5f3fd50b7346d310b3eb4b4f4adf40ef3ca848076cbbd26593f2a24a5f110e7d675747345d1a3c619ddc275a5a9dc01fb891d4b2315ce3de4092fd12c2f6b38ead392", @ANYRESOCT=r4], 0xdd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x47ff}) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1062.269161][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.269161][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.269161][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.299347][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1062.299347][T26202] ? ktime_get+0x390/0x470 [ 1062.299347][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1062.299347][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.299347][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1062.299347][T26202] bpf_test_run+0x53f/0xe60 [ 1062.299347][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.299347][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1062.299347][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1062.299347][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1062.299347][T26202] ? __msan_get_context_state+0x9/0x20 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1062.299347][T26202] __se_sys_bpf+0x8e/0xa0 [ 1062.299347][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1062.299347][T26202] __do_fast_syscall_32+0x127/0x180 [ 1062.299347][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1062.299347][T26202] do_SYSENTER_32+0x73/0x90 [ 1062.299347][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1062.299347][T26202] RIP: 0023:0xf7ff4549 [ 1062.299347][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1062.299347][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1062.299347][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1062.299347][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1062.299347][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1062.299347][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1062.509137][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1062.509137][T26202] [ 1062.509137][T26202] Uninit was created at: [ 1062.509137][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1062.509137][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1062.509137][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1062.509137][T26202] pskb_expand_head+0x25e/0x1e20 [ 1062.509137][T26202] skb_ensure_writable+0x4cf/0x590 [ 1062.509137][T26202] bpf_clone_redirect+0x25d/0x660 [ 1062.509137][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1062.509137][T26202] __bpf_prog_run512+0x12e/0x190 [ 1062.509137][T26202] bpf_test_run+0x53f/0xe60 [ 1062.509137][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1062.509137][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1062.509137][T26202] __se_sys_bpf+0x8e/0xa0 [ 1062.509137][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1062.509137][T26202] __do_fast_syscall_32+0x127/0x180 [ 1062.509137][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1062.509137][T26202] do_SYSENTER_32+0x73/0x90 [ 1062.509137][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1062.509137][T26202] ===================================================== [ 1062.538938][T26173] ===================================================== [ 1062.538938][T26173] BUG: KMSAN: uninit-value in hsr_fill_frame_info+0x521/0x6a0 [ 1062.538938][T26173] CPU: 0 PID: 26173 Comm: syz-executor.2 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1062.538938][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1062.538938][T26173] Call Trace: [ 1062.538938][T26173] dump_stack+0x24c/0x2e0 [ 1062.538938][T26173] kmsan_report+0xfb/0x1e0 [ 1062.538938][T26173] __msan_warning+0x5c/0xa0 [ 1062.538938][T26173] hsr_fill_frame_info+0x521/0x6a0 [ 1062.538938][T26173] ? hsr_drop_frame+0x2a0/0x2a0 [ 1062.538938][T26173] hsr_forward_skb+0xc4f/0x27f0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] hsr_dev_xmit+0x133/0x230 [ 1062.538938][T26173] ? is_hsr_master+0xb0/0xb0 [ 1062.538938][T26173] xmit_one+0x2b6/0x760 [ 1062.538938][T26173] __dev_queue_xmit+0x3432/0x4600 [ 1062.538938][T26173] dev_queue_xmit+0x4b/0x60 [ 1062.538938][T26173] __bpf_redirect+0x1461/0x16b0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] bpf_clone_redirect+0x4a1/0x660 [ 1062.538938][T26173] ___bpf_prog_run+0x2b78/0xb950 [ 1062.538938][T26173] ? bpf_csum_level+0x760/0x760 [ 1062.538938][T26173] __bpf_prog_run512+0x12e/0x190 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1062.538938][T26173] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1062.538938][T26173] ? ktime_get+0x390/0x470 [ 1062.538938][T26173] ? kmsan_get_metadata+0x4f/0x180 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? __bpf_prog_run480+0x190/0x190 [ 1062.538938][T26173] bpf_test_run+0x53f/0xe60 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] bpf_prog_test_run_skb+0x1914/0x3500 [ 1062.538938][T26173] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1062.538938][T26173] __do_sys_bpf+0xbe6f/0x1aba0 [ 1062.538938][T26173] ? kmsan_internal_set_origin+0x85/0xc0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_internal_check_memory+0xb5/0x520 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] ? kmsan_get_metadata+0x116/0x180 [ 1062.538938][T26173] __se_sys_bpf+0x8e/0xa0 [ 1062.538938][T26173] __ia32_sys_bpf+0x4a/0x70 [ 1062.538938][T26173] __do_fast_syscall_32+0x127/0x180 [ 1062.538938][T26173] do_fast_syscall_32+0x6a/0xc0 [ 1062.538938][T26173] do_SYSENTER_32+0x73/0x90 [ 1062.538938][T26173] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1062.538938][T26173] RIP: 0023:0xf7f62549 [ 1062.538938][T26173] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1062.538938][T26173] RSP: 002b:00000000f555c5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1062.538938][T26173] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1062.538938][T26173] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1062.538938][T26173] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1062.538938][T26173] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1062.538938][T26173] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1062.538938][T26173] [ 1062.538938][T26173] Uninit was created at: [ 1062.538938][T26173] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1062.538938][T26173] kmsan_slab_alloc+0x8e/0xe0 [ 1062.538938][T26173] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1062.538938][T26173] pskb_expand_head+0x25e/0x1e20 [ 1062.538938][T26173] skb_ensure_writable+0x4cf/0x590 [ 1062.538938][T26173] bpf_clone_redirect+0x25d/0x660 [ 1062.538938][T26173] ___bpf_prog_run+0x2b78/0xb950 [ 1062.538938][T26173] __bpf_prog_run512+0x12e/0x190 [ 1062.538938][T26173] bpf_test_run+0x53f/0xe60 [ 1062.538938][T26173] bpf_prog_test_run_skb+0x1914/0x3500 [ 1062.538938][T26173] __do_sys_bpf+0xbe6f/0x1aba0 [ 1062.538938][T26173] __se_sys_bpf+0x8e/0xa0 [ 1062.538938][T26173] __ia32_sys_bpf+0x4a/0x70 [ 1062.538938][T26173] __do_fast_syscall_32+0x127/0x180 [ 1062.538938][T26173] do_fast_syscall_32+0x6a/0xc0 [ 1062.538938][T26173] do_SYSENTER_32+0x73/0x90 [ 1062.538938][T26173] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1062.538938][T26173] ===================================================== [ 1062.631229][T26202] ===================================================== [ 1063.107813][T26202] BUG: KMSAN: uninit-value in stack_trace_consume_entry+0x171/0x310 [ 1063.107813][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1063.107813][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.131371][T26202] Call Trace: [ 1063.131371][T26202] dump_stack+0x24c/0x2e0 [ 1063.131371][T26202] kmsan_report+0xfb/0x1e0 [ 1063.131371][T26202] __msan_warning+0x5c/0xa0 [ 1063.131371][T26202] stack_trace_consume_entry+0x171/0x310 [ 1063.131371][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1063.131371][T26202] ? stack_trace_save+0x1a0/0x1a0 [ 1063.131371][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] stack_trace_save+0x117/0x1a0 [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] ? __kmalloc_node_track_caller+0xd85/0x1470 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1063.131371][T26202] ? kmsan_memcpy_memmove_metadata+0x110/0x2d0 [ 1063.131371][T26202] ? kmsan_memcpy_metadata+0xb/0x10 [ 1063.131371][T26202] ? __msan_memcpy+0x46/0x60 [ 1063.131371][T26202] ? __copy_skb_header+0x77a/0x8b0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1063.131371][T26202] ? __pskb_copy_fclone+0x1514/0x1920 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1063.131371][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1063.131371][T26202] __msan_memmove+0x46/0x60 [ 1063.131371][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1063.131371][T26202] ? prp_get_untagged_frame+0x430/0x430 [ 1063.131371][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] hsr_dev_xmit+0x133/0x230 [ 1063.131371][T26202] ? is_hsr_master+0xb0/0xb0 [ 1063.131371][T26202] xmit_one+0x2b6/0x760 [ 1063.131371][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1063.131371][T26202] dev_queue_xmit+0x4b/0x60 [ 1063.131371][T26202] __bpf_redirect+0x1461/0x16b0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1063.131371][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1063.131371][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1063.131371][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1063.131371][T26202] ? bpf_csum_level+0x760/0x760 [ 1063.131371][T26202] __bpf_prog_run512+0x12e/0x190 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1063.131371][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1063.131371][T26202] ? ktime_get+0x390/0x470 [ 1063.131371][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1063.131371][T26202] bpf_test_run+0x53f/0xe60 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.131371][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1063.131371][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.131371][T26202] ? __msan_get_context_state+0x9/0x20 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1063.131371][T26202] __se_sys_bpf+0x8e/0xa0 [ 1063.131371][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1063.131371][T26202] __do_fast_syscall_32+0x127/0x180 [ 1063.131371][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1063.131371][T26202] do_SYSENTER_32+0x73/0x90 [ 1063.131371][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.131371][T26202] RIP: 0023:0xf7ff4549 [ 1063.131371][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1063.131371][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1063.131371][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1063.131371][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1063.131371][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1063.131371][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1063.131371][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1063.131371][T26202] [ 1063.131371][T26202] Uninit was stored to memory at: [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] __msan_chain_origin+0x54/0xa0 [ 1063.131371][T26202] stack_trace_consume_entry+0x27a/0x310 [ 1063.131371][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1063.131371][T26202] stack_trace_save+0x117/0x1a0 [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1063.131371][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1063.131371][T26202] __msan_memmove+0x46/0x60 [ 1063.131371][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1063.131371][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1063.131371][T26202] hsr_dev_xmit+0x133/0x230 [ 1063.131371][T26202] xmit_one+0x2b6/0x760 [ 1063.131371][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1063.131371][T26202] dev_queue_xmit+0x4b/0x60 [ 1063.131371][T26202] __bpf_redirect+0x1461/0x16b0 [ 1063.131371][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1063.131371][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1063.131371][T26202] __bpf_prog_run512+0x12e/0x190 [ 1063.131371][T26202] bpf_test_run+0x53f/0xe60 [ 1063.131371][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.131371][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.131371][T26202] __se_sys_bpf+0x8e/0xa0 [ 1063.131371][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1063.131371][T26202] __do_fast_syscall_32+0x127/0x180 [ 1063.131371][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1063.131371][T26202] do_SYSENTER_32+0x73/0x90 [ 1063.131371][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.131371][T26202] [ 1063.131371][T26202] Uninit was stored to memory at: [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] __msan_chain_origin+0x54/0xa0 [ 1063.131371][T26202] stack_trace_save+0x193/0x1a0 [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1063.131371][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1063.131371][T26202] __msan_memmove+0x46/0x60 [ 1063.131371][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1063.131371][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1063.131371][T26202] hsr_dev_xmit+0x133/0x230 [ 1063.131371][T26202] xmit_one+0x2b6/0x760 [ 1063.131371][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1063.131371][T26202] dev_queue_xmit+0x4b/0x60 [ 1063.131371][T26202] __bpf_redirect+0x1461/0x16b0 [ 1063.131371][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1063.131371][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1063.131371][T26202] __bpf_prog_run512+0x12e/0x190 [ 1063.131371][T26202] bpf_test_run+0x53f/0xe60 [ 1063.131371][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.131371][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.131371][T26202] __se_sys_bpf+0x8e/0xa0 [ 1063.131371][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1063.131371][T26202] __do_fast_syscall_32+0x127/0x180 [ 1063.131371][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1063.131371][T26202] do_SYSENTER_32+0x73/0x90 [ 1063.131371][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.131371][T26202] [ 1063.131371][T26202] Uninit was stored to memory at: [ 1063.131371][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1063.131371][T26202] __msan_chain_origin+0x54/0xa0 [ 1063.131371][T26202] hsr_forward_skb+0x22c5/0x27f0 [ 1063.131371][T26202] hsr_dev_xmit+0x133/0x230 [ 1063.131371][T26202] xmit_one+0x2b6/0x760 [ 1063.131371][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1063.131371][T26202] dev_queue_xmit+0x4b/0x60 [ 1063.131371][T26202] __bpf_redirect+0x1461/0x16b0 [ 1063.131371][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1063.131371][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1063.131371][T26202] __bpf_prog_run512+0x12e/0x190 [ 1063.131371][T26202] bpf_test_run+0x53f/0xe60 [ 1063.131371][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.131371][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.131371][T26202] __se_sys_bpf+0x8e/0xa0 [ 1063.131371][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1063.131371][T26202] __do_fast_syscall_32+0x127/0x180 [ 1063.131371][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1063.131371][T26202] do_SYSENTER_32+0x73/0x90 [ 1063.131371][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.131371][T26202] [ 1063.131371][T26202] Uninit was created at: [ 1063.131371][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1063.131371][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1063.131371][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1063.131371][T26202] pskb_expand_head+0x25e/0x1e20 [ 1063.131371][T26202] skb_ensure_writable+0x4cf/0x590 [ 1063.131371][T26202] bpf_clone_redirect+0x25d/0x660 [ 1063.131371][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1063.131371][T26202] __bpf_prog_run512+0x12e/0x190 [ 1063.131371][T26202] bpf_test_run+0x53f/0xe60 [ 1063.131371][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.131371][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.131371][T26202] __se_sys_bpf+0x8e/0xa0 [ 1063.131371][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1063.131371][T26202] __do_fast_syscall_32+0x127/0x180 [ 1063.131371][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1063.131371][T26202] do_SYSENTER_32+0x73/0x90 [ 1063.131371][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.131371][T26202] ===================================================== [ 1063.208977][T26176] ===================================================== [ 1063.208977][T26176] BUG: KMSAN: uninit-value in hsr_fill_frame_info+0x521/0x6a0 [ 1063.208977][T26176] CPU: 0 PID: 26176 Comm: syz-executor.2 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1063.208977][T26176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.208977][T26176] Call Trace: [ 1063.208977][T26176] dump_stack+0x24c/0x2e0 [ 1063.208977][T26176] kmsan_report+0xfb/0x1e0 [ 1063.208977][T26176] __msan_warning+0x5c/0xa0 [ 1063.208977][T26176] hsr_fill_frame_info+0x521/0x6a0 [ 1063.208977][T26176] ? hsr_drop_frame+0x2a0/0x2a0 [ 1063.208977][T26176] hsr_forward_skb+0xc4f/0x27f0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] hsr_dev_xmit+0x133/0x230 [ 1063.208977][T26176] ? is_hsr_master+0xb0/0xb0 [ 1063.208977][T26176] xmit_one+0x2b6/0x760 [ 1063.208977][T26176] __dev_queue_xmit+0x3432/0x4600 [ 1063.208977][T26176] dev_queue_xmit+0x4b/0x60 [ 1063.208977][T26176] __bpf_redirect+0x1461/0x16b0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] bpf_clone_redirect+0x4a1/0x660 [ 1063.208977][T26176] ___bpf_prog_run+0x2b78/0xb950 [ 1063.208977][T26176] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1063.208977][T26176] ? __msan_instrument_asm_store+0x107/0x130 [ 1063.208977][T26176] ? bpf_csum_level+0x760/0x760 [ 1063.208977][T26176] __bpf_prog_run512+0x12e/0x190 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1063.208977][T26176] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1063.208977][T26176] ? ktime_get+0x390/0x470 [ 1063.208977][T26176] ? kmsan_get_metadata+0x4f/0x180 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? __bpf_prog_run480+0x190/0x190 [ 1063.208977][T26176] bpf_test_run+0x53f/0xe60 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.208977][T26176] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1063.208977][T26176] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.208977][T26176] ? kmsan_internal_set_origin+0x85/0xc0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_internal_check_memory+0xb5/0x520 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] ? kmsan_get_metadata+0x116/0x180 [ 1063.208977][T26176] __se_sys_bpf+0x8e/0xa0 [ 1063.208977][T26176] __ia32_sys_bpf+0x4a/0x70 [ 1063.208977][T26176] __do_fast_syscall_32+0x127/0x180 [ 1063.208977][T26176] do_fast_syscall_32+0x6a/0xc0 [ 1063.208977][T26176] do_SYSENTER_32+0x73/0x90 [ 1063.208977][T26176] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.208977][T26176] RIP: 0023:0xf7f62549 [ 1063.208977][T26176] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1063.208977][T26176] RSP: 002b:00000000f553b5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1063.208977][T26176] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1063.208977][T26176] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1063.208977][T26176] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1063.208977][T26176] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1063.208977][T26176] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1063.208977][T26176] [ 1063.208977][T26176] Uninit was created at: [ 1063.208977][T26176] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1063.208977][T26176] kmsan_slab_alloc+0x8e/0xe0 [ 1063.208977][T26176] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1063.208977][T26176] pskb_expand_head+0x25e/0x1e20 [ 1063.208977][T26176] skb_ensure_writable+0x4cf/0x590 [ 1063.208977][T26176] bpf_clone_redirect+0x25d/0x660 [ 1063.208977][T26176] ___bpf_prog_run+0x2b78/0xb950 [ 1063.208977][T26176] __bpf_prog_run512+0x12e/0x190 [ 1063.208977][T26176] bpf_test_run+0x53f/0xe60 [ 1063.208977][T26176] bpf_prog_test_run_skb+0x1914/0x3500 [ 1063.208977][T26176] __do_sys_bpf+0xbe6f/0x1aba0 [ 1063.208977][T26176] __se_sys_bpf+0x8e/0xa0 [ 1063.208977][T26176] __ia32_sys_bpf+0x4a/0x70 [ 1063.208977][T26176] __do_fast_syscall_32+0x127/0x180 [ 1063.208977][T26176] do_fast_syscall_32+0x6a/0xc0 [ 1063.208977][T26176] do_SYSENTER_32+0x73/0x90 [ 1063.208977][T26176] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1063.208977][T26176] ===================================================== [ 1064.164154][T26202] ===================================================== [ 1064.651094][T26176] net_ratelimit: 2 callbacks suppressed [ 1064.651159][T26176] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1064.164154][T26202] BUG: KMSAN: uninit-value in stack_trace_consume_entry+0x171/0x310 [ 1064.164154][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1064.663223][T26176] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1064.164154][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.164154][T26202] Call Trace: [ 1064.164154][T26202] dump_stack+0x24c/0x2e0 [ 1064.164154][T26202] kmsan_report+0xfb/0x1e0 [ 1064.164154][T26202] __msan_warning+0x5c/0xa0 [ 1064.164154][T26202] stack_trace_consume_entry+0x171/0x310 [ 1064.164154][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.164154][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.164154][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1064.164154][T26202] ? stack_trace_save+0x1a0/0x1a0 [ 1064.164154][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.164154][T26202] stack_trace_save+0x117/0x1a0 [ 1064.164154][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.164154][T26202] ? __kmalloc_node_track_caller+0xd85/0x1470 [ 1064.164154][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.164154][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1064.164154][T26202] ? kmsan_memcpy_memmove_metadata+0x110/0x2d0 [ 1064.164154][T26202] ? kmsan_memcpy_metadata+0xb/0x10 [ 1064.164154][T26202] ? __msan_memcpy+0x46/0x60 [ 1064.164154][T26202] ? __copy_skb_header+0x77a/0x8b0 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.164154][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.164154][T26202] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1064.164154][T26202] ? __pskb_copy_fclone+0x1514/0x1920 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.164154][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.164154][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1064.164154][T26202] __msan_memmove+0x46/0x60 [ 1064.164154][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1064.164154][T26202] ? prp_get_untagged_frame+0x430/0x430 [ 1064.164154][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.164154][T26202] hsr_dev_xmit+0x133/0x230 [ 1064.164154][T26202] ? is_hsr_master+0xb0/0xb0 [ 1064.164154][T26202] xmit_one+0x2b6/0x760 [ 1064.164154][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1064.164154][T26202] dev_queue_xmit+0x4b/0x60 [ 1064.164154][T26202] __bpf_redirect+0x1461/0x16b0 [ 1064.164154][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.909083][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1064.909083][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1064.909083][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1064.909083][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1064.909083][T26202] ? bpf_csum_level+0x760/0x760 [ 1064.939036][T26202] __bpf_prog_run512+0x12e/0x190 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1064.939036][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1064.939036][T26202] ? ktime_get+0x390/0x470 [ 1064.939036][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1064.939036][T26202] bpf_test_run+0x53f/0xe60 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1064.939036][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1064.939036][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1064.939036][T26202] ? __msan_get_context_state+0x9/0x20 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1064.939036][T26202] __se_sys_bpf+0x8e/0xa0 [ 1064.939036][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1064.939036][T26202] __do_fast_syscall_32+0x127/0x180 [ 1064.939036][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1064.939036][T26202] do_SYSENTER_32+0x73/0x90 [ 1064.939036][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1064.939036][T26202] RIP: 0023:0xf7ff4549 [ 1064.939036][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1064.939036][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1064.939036][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1064.939036][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1064.939036][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1064.939036][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1064.939036][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1064.939036][T26202] [ 1064.939036][T26202] Uninit was stored to memory at: [ 1064.939036][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.939036][T26202] __msan_chain_origin+0x54/0xa0 [ 1064.939036][T26202] stack_trace_consume_entry+0x27a/0x310 [ 1064.939036][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1064.939036][T26202] stack_trace_save+0x117/0x1a0 [ 1064.939036][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.939036][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.939036][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1064.939036][T26202] __msan_memmove+0x46/0x60 [ 1064.939036][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1064.939036][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1064.939036][T26202] hsr_dev_xmit+0x133/0x230 [ 1064.939036][T26202] xmit_one+0x2b6/0x760 [ 1064.939036][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1064.939036][T26202] dev_queue_xmit+0x4b/0x60 [ 1064.939036][T26202] __bpf_redirect+0x1461/0x16b0 [ 1064.939036][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1064.939036][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1064.939036][T26202] __bpf_prog_run512+0x12e/0x190 [ 1064.939036][T26202] bpf_test_run+0x53f/0xe60 [ 1064.939036][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1064.939036][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1064.939036][T26202] __se_sys_bpf+0x8e/0xa0 [ 1064.939036][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1064.939036][T26202] __do_fast_syscall_32+0x127/0x180 [ 1064.939036][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1064.939036][T26202] do_SYSENTER_32+0x73/0x90 [ 1064.939036][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1064.939036][T26202] [ 1064.939036][T26202] Uninit was stored to memory at: [ 1064.939036][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.939036][T26202] __msan_chain_origin+0x54/0xa0 [ 1064.939036][T26202] stack_trace_save+0x193/0x1a0 [ 1064.939036][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.939036][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1064.939036][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1064.939036][T26202] __msan_memmove+0x46/0x60 [ 1064.939036][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1064.939036][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1064.939036][T26202] hsr_dev_xmit+0x133/0x230 [ 1064.939036][T26202] xmit_one+0x2b6/0x760 [ 1064.939036][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1064.939036][T26202] dev_queue_xmit+0x4b/0x60 [ 1064.939036][T26202] __bpf_redirect+0x1461/0x16b0 [ 1064.939036][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1064.939036][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1064.939036][T26202] __bpf_prog_run512+0x12e/0x190 [ 1064.939036][T26202] bpf_test_run+0x53f/0xe60 [ 1064.939036][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1064.939036][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1064.939036][T26202] __se_sys_bpf+0x8e/0xa0 [ 1064.939036][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1064.939036][T26202] __do_fast_syscall_32+0x127/0x180 [ 1064.939036][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1064.939036][T26202] do_SYSENTER_32+0x73/0x90 [ 1064.939036][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1064.939036][T26202] [ 1064.939036][T26202] Uninit was stored to memory at: [ 1064.939036][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1064.939036][T26202] __msan_chain_origin+0x54/0xa0 [ 1064.939036][T26202] hsr_forward_skb+0x22c5/0x27f0 [ 1064.939036][T26202] hsr_dev_xmit+0x133/0x230 [ 1064.939036][T26202] xmit_one+0x2b6/0x760 [ 1064.939036][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1064.939036][T26202] dev_queue_xmit+0x4b/0x60 [ 1064.939036][T26202] __bpf_redirect+0x1461/0x16b0 [ 1064.939036][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1064.939036][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1064.939036][T26202] __bpf_prog_run512+0x12e/0x190 [ 1064.939036][T26202] bpf_test_run+0x53f/0xe60 [ 1064.939036][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1064.939036][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1064.939036][T26202] __se_sys_bpf+0x8e/0xa0 [ 1064.939036][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1064.939036][T26202] __do_fast_syscall_32+0x127/0x180 [ 1064.939036][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1064.939036][T26202] do_SYSENTER_32+0x73/0x90 [ 1064.939036][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1064.939036][T26202] [ 1064.939036][T26202] Uninit was created at: [ 1064.939036][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1064.939036][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1064.939036][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1064.939036][T26202] pskb_expand_head+0x25e/0x1e20 [ 1064.939036][T26202] skb_ensure_writable+0x4cf/0x590 [ 1064.939036][T26202] bpf_clone_redirect+0x25d/0x660 [ 1064.939036][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1064.939036][T26202] __bpf_prog_run512+0x12e/0x190 [ 1064.939036][T26202] bpf_test_run+0x53f/0xe60 [ 1064.939036][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1064.939036][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1064.939036][T26202] __se_sys_bpf+0x8e/0xa0 [ 1064.939036][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1064.939036][T26202] __do_fast_syscall_32+0x127/0x180 [ 1064.939036][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1064.939036][T26202] do_SYSENTER_32+0x73/0x90 [ 1064.939036][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1064.939036][T26202] ===================================================== [ 1065.723018][T26202] ===================================================== [ 1065.729950][T26202] BUG: KMSAN: uninit-value in stack_trace_consume_entry+0x171/0x310 [ 1065.732919][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1065.732919][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1065.732919][T26202] Call Trace: [ 1065.732919][T26202] dump_stack+0x24c/0x2e0 [ 1065.732919][T26202] kmsan_report+0xfb/0x1e0 [ 1065.732919][T26202] __msan_warning+0x5c/0xa0 [ 1065.732919][T26202] stack_trace_consume_entry+0x171/0x310 [ 1065.732919][T26202] ? kmsan_memmove_metadata+0xe/0x10 [ 1065.732919][T26202] ? kmsan_memmove_metadata+0xe/0x10 [ 1065.732919][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1065.732919][T26202] ? stack_trace_save+0x1a0/0x1a0 [ 1065.732919][T26202] ? kmsan_memmove_metadata+0xe/0x10 [ 1065.732919][T26202] stack_trace_save+0x117/0x1a0 [ 1065.732919][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1065.732919][T26202] ? __kmalloc_node_track_caller+0xd85/0x1470 [ 1065.732919][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1065.732919][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1065.732919][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.732919][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.732919][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1065.849021][T26202] ? kmsan_memcpy_memmove_metadata+0x110/0x2d0 [ 1065.849021][T26202] ? kmsan_memcpy_metadata+0xb/0x10 [ 1065.849021][T26202] ? __msan_memcpy+0x46/0x60 [ 1065.849021][T26202] ? __copy_skb_header+0x77a/0x8b0 [ 1065.849021][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.849021][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1065.879195][T26202] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1065.879195][T26202] ? __pskb_copy_fclone+0x1514/0x1920 [ 1065.879195][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.879195][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1065.879195][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1065.909023][T26202] __msan_memmove+0x46/0x60 [ 1065.909023][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1065.909023][T26202] ? prp_get_untagged_frame+0x430/0x430 [ 1065.909023][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1065.909023][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.909023][T26202] hsr_dev_xmit+0x133/0x230 [ 1065.939191][T26202] ? is_hsr_master+0xb0/0xb0 [ 1065.939191][T26202] xmit_one+0x2b6/0x760 [ 1065.939191][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1065.939191][T26202] dev_queue_xmit+0x4b/0x60 [ 1065.939191][T26202] __bpf_redirect+0x1461/0x16b0 [ 1065.939191][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.969022][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1065.969022][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1065.969022][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1065.969022][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1065.969022][T26202] ? bpf_csum_level+0x760/0x760 [ 1065.969022][T26202] __bpf_prog_run512+0x12e/0x190 [ 1065.999181][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1065.999181][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1065.999181][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1065.999181][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1065.999181][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1066.029043][T26202] ? ktime_get+0x390/0x470 [ 1066.029043][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1066.029043][T26202] bpf_test_run+0x53f/0xe60 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.029043][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1066.029043][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.029043][T26202] ? __msan_get_context_state+0x9/0x20 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.029043][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.029043][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.029043][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.029043][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.029043][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.029043][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.029043][T26202] RIP: 0023:0xf7ff4549 [ 1066.029043][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1066.029043][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1066.029043][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1066.029043][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1066.029043][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1066.029043][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1066.029043][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1066.029043][T26202] [ 1066.029043][T26202] Uninit was stored to memory at: [ 1066.029043][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.029043][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.029043][T26202] stack_trace_consume_entry+0x27a/0x310 [ 1066.029043][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1066.029043][T26202] stack_trace_save+0x117/0x1a0 [ 1066.029043][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.029043][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.029043][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1066.029043][T26202] __msan_memmove+0x46/0x60 [ 1066.029043][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1066.029043][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1066.029043][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.029043][T26202] xmit_one+0x2b6/0x760 [ 1066.029043][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.029043][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.029043][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.029043][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.029043][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.029043][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.029043][T26202] bpf_test_run+0x53f/0xe60 [ 1066.029043][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.029043][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.029043][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.029043][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.029043][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.029043][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.029043][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.029043][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.029043][T26202] [ 1066.029043][T26202] Uninit was stored to memory at: [ 1066.029043][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.029043][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.029043][T26202] stack_trace_save+0x193/0x1a0 [ 1066.029043][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.029043][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.029043][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1066.029043][T26202] __msan_memmove+0x46/0x60 [ 1066.479180][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1066.479180][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1066.479180][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.479180][T26202] xmit_one+0x2b6/0x760 [ 1066.479180][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.479180][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.509062][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.509062][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.509062][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.509062][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.509062][T26202] bpf_test_run+0x53f/0xe60 [ 1066.509062][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.539200][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.539200][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.539200][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.539200][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.539200][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.539200][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.539200][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.539200][T26202] [ 1066.539200][T26202] Uninit was stored to memory at: [ 1066.539200][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.539200][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.539200][T26202] hsr_forward_skb+0x22c5/0x27f0 [ 1066.539200][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.539200][T26202] xmit_one+0x2b6/0x760 [ 1066.539200][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.539200][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.539200][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.539200][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.539200][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.539200][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.539200][T26202] bpf_test_run+0x53f/0xe60 [ 1066.539200][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.539200][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.539200][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.539200][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.539200][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.539200][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.539200][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.539200][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.539200][T26202] [ 1066.539200][T26202] Uninit was created at: [ 1066.539200][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1066.539200][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1066.539200][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1066.539200][T26202] pskb_expand_head+0x25e/0x1e20 [ 1066.539200][T26202] skb_ensure_writable+0x4cf/0x590 [ 1066.539200][T26202] bpf_clone_redirect+0x25d/0x660 [ 1066.539200][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.539200][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.539200][T26202] bpf_test_run+0x53f/0xe60 [ 1066.539200][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.539200][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.539200][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.539200][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.539200][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.539200][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.539200][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.539200][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.539200][T26202] ===================================================== [ 1066.782440][T26202] ===================================================== [ 1066.789477][T26202] BUG: KMSAN: uninit-value in stack_trace_consume_entry+0x171/0x310 [ 1066.792333][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1066.792333][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.792333][T26202] Call Trace: [ 1066.792333][T26202] dump_stack+0x24c/0x2e0 [ 1066.792333][T26202] kmsan_report+0xfb/0x1e0 [ 1066.792333][T26202] __msan_warning+0x5c/0xa0 [ 1066.792333][T26202] stack_trace_consume_entry+0x171/0x310 [ 1066.792333][T26202] ? __msan_memmove+0x46/0x60 [ 1066.792333][T26202] ? __msan_memmove+0x46/0x60 [ 1066.792333][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1066.792333][T26202] ? stack_trace_save+0x1a0/0x1a0 [ 1066.792333][T26202] ? __msan_memmove+0x46/0x60 [ 1066.792333][T26202] stack_trace_save+0x117/0x1a0 [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] ? __kmalloc_node_track_caller+0xd85/0x1470 [ 1066.792333][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.792333][T26202] ? kmsan_memmove_metadata+0xe/0x10 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1066.792333][T26202] ? kmsan_memcpy_memmove_metadata+0x110/0x2d0 [ 1066.792333][T26202] ? kmsan_memcpy_metadata+0xb/0x10 [ 1066.792333][T26202] ? __msan_memcpy+0x46/0x60 [ 1066.792333][T26202] ? __copy_skb_header+0x77a/0x8b0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1066.792333][T26202] ? __pskb_copy_fclone+0x1514/0x1920 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.792333][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1066.792333][T26202] __msan_memmove+0x46/0x60 [ 1066.792333][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1066.792333][T26202] ? prp_get_untagged_frame+0x430/0x430 [ 1066.792333][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.792333][T26202] ? is_hsr_master+0xb0/0xb0 [ 1066.792333][T26202] xmit_one+0x2b6/0x760 [ 1066.792333][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.792333][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.792333][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.792333][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.792333][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1066.792333][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1066.792333][T26202] ? bpf_csum_level+0x760/0x760 [ 1066.792333][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1066.792333][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1066.792333][T26202] ? ktime_get+0x390/0x470 [ 1066.792333][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1066.792333][T26202] bpf_test_run+0x53f/0xe60 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.792333][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1066.792333][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.792333][T26202] ? __msan_get_context_state+0x9/0x20 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1066.792333][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.792333][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.792333][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.792333][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.792333][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.792333][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.792333][T26202] RIP: 0023:0xf7ff4549 [ 1066.792333][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1066.792333][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1066.792333][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1066.792333][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1066.792333][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1066.792333][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1066.792333][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1066.792333][T26202] [ 1066.792333][T26202] Uninit was stored to memory at: [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.792333][T26202] stack_trace_consume_entry+0x27a/0x310 [ 1066.792333][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1066.792333][T26202] stack_trace_save+0x117/0x1a0 [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.792333][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1066.792333][T26202] __msan_memmove+0x46/0x60 [ 1066.792333][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1066.792333][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1066.792333][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.792333][T26202] xmit_one+0x2b6/0x760 [ 1066.792333][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.792333][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.792333][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.792333][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.792333][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.792333][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.792333][T26202] bpf_test_run+0x53f/0xe60 [ 1066.792333][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.792333][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.792333][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.792333][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.792333][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.792333][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.792333][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.792333][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.792333][T26202] [ 1066.792333][T26202] Uninit was stored to memory at: [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.792333][T26202] stack_trace_save+0x193/0x1a0 [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1066.792333][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1066.792333][T26202] __msan_memmove+0x46/0x60 [ 1066.792333][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1066.792333][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1066.792333][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.792333][T26202] xmit_one+0x2b6/0x760 [ 1066.792333][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.792333][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.792333][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.792333][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.792333][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.792333][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.792333][T26202] bpf_test_run+0x53f/0xe60 [ 1066.792333][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.792333][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.792333][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.792333][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.792333][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.792333][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.792333][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.792333][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.792333][T26202] [ 1066.792333][T26202] Uninit was stored to memory at: [ 1066.792333][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1066.792333][T26202] __msan_chain_origin+0x54/0xa0 [ 1066.792333][T26202] hsr_forward_skb+0x22c5/0x27f0 [ 1066.792333][T26202] hsr_dev_xmit+0x133/0x230 [ 1066.792333][T26202] xmit_one+0x2b6/0x760 [ 1066.792333][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1066.792333][T26202] dev_queue_xmit+0x4b/0x60 [ 1066.792333][T26202] __bpf_redirect+0x1461/0x16b0 [ 1066.792333][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1066.792333][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.792333][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.792333][T26202] bpf_test_run+0x53f/0xe60 [ 1066.792333][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.792333][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.792333][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.792333][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.792333][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.792333][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.792333][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.792333][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.792333][T26202] [ 1066.792333][T26202] Uninit was created at: [ 1066.792333][T26202] kmsan_internal_poison_shadow+0x5c/0xf0 [ 1066.792333][T26202] kmsan_slab_alloc+0x8e/0xe0 [ 1066.792333][T26202] __kmalloc_node_track_caller+0xa4f/0x1470 [ 1066.792333][T26202] pskb_expand_head+0x25e/0x1e20 [ 1066.792333][T26202] skb_ensure_writable+0x4cf/0x590 [ 1066.792333][T26202] bpf_clone_redirect+0x25d/0x660 [ 1066.792333][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1066.792333][T26202] __bpf_prog_run512+0x12e/0x190 [ 1066.792333][T26202] bpf_test_run+0x53f/0xe60 [ 1066.792333][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1066.792333][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1066.792333][T26202] __se_sys_bpf+0x8e/0xa0 [ 1066.792333][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1066.792333][T26202] __do_fast_syscall_32+0x127/0x180 [ 1066.792333][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1066.792333][T26202] do_SYSENTER_32+0x73/0x90 [ 1066.792333][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1066.792333][T26202] ===================================================== [ 1067.843869][T26202] ===================================================== [ 1067.850982][T26202] BUG: KMSAN: uninit-value in stack_trace_consume_entry+0x171/0x310 [ 1067.853769][T26202] CPU: 1 PID: 26202 Comm: syz-executor.3 Tainted: G B W 5.12.0-rc6-syzkaller #0 [ 1067.853769][T26202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.853769][T26202] Call Trace: [ 1067.853769][T26202] dump_stack+0x24c/0x2e0 [ 1067.853769][T26202] kmsan_report+0xfb/0x1e0 [ 1067.853769][T26202] __msan_warning+0x5c/0xa0 [ 1067.853769][T26202] stack_trace_consume_entry+0x171/0x310 [ 1067.853769][T26202] ? hsr_create_tagged_frame+0x855/0x11b0 [ 1067.853769][T26202] ? hsr_create_tagged_frame+0x855/0x11b0 [ 1067.853769][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1067.853769][T26202] ? stack_trace_save+0x1a0/0x1a0 [ 1067.853769][T26202] ? hsr_create_tagged_frame+0x855/0x11b0 [ 1067.853769][T26202] stack_trace_save+0x117/0x1a0 [ 1067.853769][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1067.853769][T26202] ? __kmalloc_node_track_caller+0xd85/0x1470 [ 1067.853769][T26202] ? kmsan_internal_chain_origin+0xad/0x130 [ 1067.853769][T26202] ? kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1067.853769][T26202] ? kmsan_memmove_metadata+0xe/0x10 [ 1067.853769][T26202] ? __msan_memmove+0x46/0x60 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1067.853769][T26202] ? kmsan_memcpy_memmove_metadata+0x110/0x2d0 [ 1067.853769][T26202] ? kmsan_memcpy_metadata+0xb/0x10 [ 1067.853769][T26202] ? __msan_memcpy+0x46/0x60 [ 1067.853769][T26202] ? __copy_skb_header+0x77a/0x8b0 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 1067.853769][T26202] ? __pskb_copy_fclone+0x1514/0x1920 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1067.853769][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1067.853769][T26202] __msan_memmove+0x46/0x60 [ 1067.853769][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1067.853769][T26202] ? prp_get_untagged_frame+0x430/0x430 [ 1067.853769][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] hsr_dev_xmit+0x133/0x230 [ 1067.853769][T26202] ? is_hsr_master+0xb0/0xb0 [ 1067.853769][T26202] xmit_one+0x2b6/0x760 [ 1067.853769][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1067.853769][T26202] dev_queue_xmit+0x4b/0x60 [ 1067.853769][T26202] __bpf_redirect+0x1461/0x16b0 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] bpf_clone_redirect+0x4a1/0x660 [ 1067.853769][T26202] ___bpf_prog_run+0x2b78/0xb950 [ 1067.853769][T26202] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 1067.853769][T26202] ? __msan_instrument_asm_store+0x107/0x130 [ 1067.853769][T26202] ? bpf_csum_level+0x760/0x760 [ 1067.853769][T26202] __bpf_prog_run512+0x12e/0x190 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1067.853769][T26202] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1067.853769][T26202] ? ktime_get+0x390/0x470 [ 1067.853769][T26202] ? kmsan_get_metadata+0x4f/0x180 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] ? __bpf_prog_run480+0x190/0x190 [ 1067.853769][T26202] bpf_test_run+0x53f/0xe60 [ 1067.853769][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1067.853769][T26202] bpf_prog_test_run_skb+0x1914/0x3500 [ 1067.853769][T26202] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 1067.853769][T26202] __do_sys_bpf+0xbe6f/0x1aba0 [ 1067.853769][T26202] ? __msan_get_context_state+0x9/0x20 [ 1067.853769][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1067.853769][T26202] ? kmsan_internal_set_origin+0x85/0xc0 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] ? kmsan_internal_check_memory+0xb5/0x520 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] ? kmsan_get_metadata+0x116/0x180 [ 1068.269103][T26202] __se_sys_bpf+0x8e/0xa0 [ 1068.269103][T26202] __ia32_sys_bpf+0x4a/0x70 [ 1068.269103][T26202] __do_fast_syscall_32+0x127/0x180 [ 1068.269103][T26202] do_fast_syscall_32+0x6a/0xc0 [ 1068.269103][T26202] do_SYSENTER_32+0x73/0x90 [ 1068.269103][T26202] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 1068.269103][T26202] RIP: 0023:0xf7ff4549 [ 1068.269103][T26202] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 1068.269103][T26202] RSP: 002b:00000000f55ee5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 1068.269103][T26202] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 1068.269103][T26202] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 1068.269103][T26202] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1068.269103][T26202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1068.269103][T26202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1068.269103][T26202] [ 1068.269103][T26202] Uninit was stored to memory at: [ 1068.269103][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1068.269103][T26202] __msan_chain_origin+0x54/0xa0 [ 1068.269103][T26202] stack_trace_consume_entry+0x27a/0x310 [ 1068.269103][T26202] arch_stack_walk+0x2fa/0x3c0 [ 1068.269103][T26202] stack_trace_save+0x117/0x1a0 [ 1068.269103][T26202] kmsan_internal_chain_origin+0xad/0x130 [ 1068.269103][T26202] kmsan_memcpy_memmove_metadata+0x25e/0x2d0 [ 1068.269103][T26202] kmsan_memmove_metadata+0xe/0x10 [ 1068.269103][T26202] __msan_memmove+0x46/0x60 [ 1068.269103][T26202] hsr_create_tagged_frame+0x855/0x11b0 [ 1068.269103][T26202] hsr_forward_skb+0x16e5/0x27f0 [ 1068.269103][T26202] hsr_dev_xmit+0x133/0x230 [ 1068.269103][T26202] xmit_one+0x2b6/0x760 [ 1068.269103][T26202] __dev_queue_xmit+0x3432/0x4600 [ 1068.269103][T26202] dev_queue_xmit+0x4b/0x60 [ 1068.269103][T26202] __bpf_redirect+0x1461/0x16b0