to$inet(r0, &(0x7f0000000280)="afb194e30496873a9549056294166a72d1fa9ead100bca5fdee057c9080ce91e337a3526b32e1578d5c1c727558ce6862229167fb3d1e4cd6d75e76e854140009196d417c3c780b82686a205773896812dd4c11666f3b992d34fc0cac1814c2f18503e8b69611db2f766872487012b2698c63ba994a3d686b7a9f9db70de95cbb56ad6993aa2f2c9cc4ca04ce55f06dea05fbea7e60d2f9754d8e2f71d296e85a9cd7b3bf296f11d3f27396fbfc230f9475ea34c1edd56", 0xb7, 0x24000004, &(0x7f0000000180)={0x2, 0x4e24, @loopback}, 0x10) [ 261.139978][T11653] loop4: detected capacity change from 0 to 1024 [ 261.172945][T11652] loop5: detected capacity change from 0 to 8 [ 261.210010][T11653] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 261.229211][T11652] EXT4-fs (loop5): bad geometry: block count 99 exceeds size of device (4 blocks) [ 261.245371][T11660] loop3: detected capacity change from 0 to 1024 [ 261.281604][T11653] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 261.303037][T11660] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 261.336663][T11653] EXT4-fs (loop4): get root inode failed [ 261.342963][T11653] EXT4-fs (loop4): mount failed 02:16:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 261.410122][T11660] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated 02:16:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000080)) 02:16:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000080)) [ 261.532305][T11682] loop5: detected capacity change from 0 to 8 [ 261.545204][T11660] EXT4-fs (loop3): get root inode failed [ 261.557195][T11660] EXT4-fs (loop3): mount failed [ 261.562492][T11682] EXT4-fs (loop5): bad geometry: block count 99 exceeds size of device (4 blocks) 02:16:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) 02:16:03 executing program 3: fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00\x00'], 0x9, 0x1) r0 = getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000002c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x400000000000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYRES32=r1, @ANYRES32=0x0], 0x24}}, 0x0) sched_setaffinity(r0, 0x0, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_init1(0x0) inotify_rm_watch(r3, 0x0) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000180)='./file0\x00', 0x210000, 0x1e5) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) [ 261.746650][T11692] loop4: detected capacity change from 0 to 1024 [ 261.785425][T11692] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 02:16:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 261.849382][T11692] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 261.943245][T11692] EXT4-fs (loop4): get root inode failed 02:16:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) [ 261.987563][T11692] EXT4-fs (loop4): mount failed 02:16:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:04 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_size(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/55, 0x37) 02:16:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) [ 262.427923][T11754] loop4: detected capacity change from 0 to 1024 [ 262.539540][T11754] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 02:16:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 262.607339][T11754] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 262.671470][T11754] EXT4-fs (loop4): get root inode failed [ 262.689875][T11754] EXT4-fs (loop4): mount failed 02:16:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x2e, @private=0xa010101, 0x4e20, 0x0, 'sed\x00', 0x2, 0x3ff, 0x54}, 0x2c) sendto$inet6(r1, 0x0, 0x0, 0x20088881, &(0x7f00000000c0)={0xa, 0x4e1d, 0x0, @remote}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) 02:16:05 executing program 3: syz_emit_ethernet(0x86, &(0x7f0000000200)=ANY=[@ANYBLOB="bbbbbbbbbbbb00f5b367d5000800450000780000000000119078000000000000000000001b59006490780200000000000000cd3eb53da297000000000000000108653902066a9dab00000000000600000000009e0000000000000000006060adb17300000c2d99280000000000694c875dfb1be5d2a0057a62022a1564a329d3a13bd5b6cc6a9471314a1d8c69"], 0x0) syz_emit_ethernet(0xe0, &(0x7f00000002c0)={@empty, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x16}, @void, {@x25={0x805, {0x0, 0x45, 0x9, "ecb7215204c1f4bc4afcb60e34ea0c5434266511411d3b5fad838805a1daff0921414d58f6060add52aaee52eb11b1ea1fc9a68b1968709d6d4c0c003252345d2077c016a35e31143d1531e2ce1471454939350c1eb3f6d14e56a1fadc7dc3ac0791fbb258d1b8f8ebaf82cf510746b8d444df12feb40eef76bba33f1a9aefe5d2ab48e02145c929fa32efb4bcedac27089181846e3a8f882f8774f101f42acf34b1266a48f09a81c224f090a8f6a821672cb92cc14d3f6f0fe765139eb3fdf92e9edd16392a4cc2a4ee2d59e225cf"}}}}, &(0x7f0000000000)={0x0, 0x4, [0xfaa, 0xbac, 0xa1f, 0xee1]}) syz_emit_ethernet(0xde, &(0x7f00000000c0)={@empty, @local, @void, {@llc_tr={0x11, {@llc={0xfe, 0xf0, "c5", "1d374b414901eb017f120bf40c23f37ed8d31aba19c589502bff3661f1519c75c369d672dcc404fc10cf653c1eac32b05aa0683fd473afc33e6f2d179b30a88485b1943453bd3b663bf62dbf4c20fbbce449f6754eef5ba1cde14ae8164ee095ca9d1e6f7100681949e641da379f8f83d0a4c32018eafb815259024059c68fa2ba9c2c25891f2b7f23fd1a950e1bef31b2cb27341fecf8184c04def240aa8ffaf3efb8ca5308eb5cf2bb97ce32fcb70b28a870585e848627f0bd9fc071d7257b76e35d27fb70b8ef10d5eb8f70"}}}}}, &(0x7f00000001c0)={0x1, 0x1, [0xbc3, 0x415, 0x4c0, 0x377]}) 02:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}], 0x81, &(0x7f0000000080)) 02:16:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 263.469347][T11793] loop4: detected capacity change from 0 to 1024 [ 263.493086][T11794] loop5: detected capacity change from 0 to 1024 [ 263.520981][T11793] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 263.538664][T11793] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 263.553228][T11793] EXT4-fs (loop4): get root inode failed [ 263.559758][T11793] EXT4-fs (loop4): mount failed [ 263.585262][T11794] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 263.638495][T11794] EXT4-fs error (device loop5): ext4_fill_super:4956: inode #2: comm syz-executor.5: iget: root inode unallocated 02:16:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000080)) [ 263.757717][T11794] EXT4-fs (loop5): get root inode failed [ 263.766656][T11794] EXT4-fs (loop5): mount failed 02:16:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) mount(0x0, 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x100007e00) 02:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)) 02:16:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:05 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d400000010003b0e00"/20, @ANYRES32, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e0a800010500170000000000060002003f000000060011004e24000005001600020000000500170000000000050008000000000008000600ac"], 0xd4}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @private=0xa010102}, 0x1, 0x2}}, 0x80) sendmmsg(r0, &(0x7f0000000000), 0x400000000000206, 0x0) [ 263.909675][T11815] loop4: detected capacity change from 0 to 1024 [ 263.962169][T11815] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 263.987778][T11815] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 264.022930][T11823] loop5: detected capacity change from 0 to 1024 [ 264.052058][T11815] EXT4-fs (loop4): get root inode failed [ 264.057838][T11815] EXT4-fs (loop4): mount failed [ 264.080801][T11823] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 264.127376][T11823] EXT4-fs error (device loop5): ext4_fill_super:4956: inode #2: comm syz-executor.5: iget: root inode unallocated 02:16:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:06 executing program 3: syz_mount_image$vxfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') [ 264.192636][T11823] EXT4-fs (loop5): get root inode failed [ 264.236397][T11823] EXT4-fs (loop5): mount failed 02:16:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) [ 264.356045][T11842] vxfs: WRONG superblock magic 00000000 at 1 [ 264.374833][T11845] loop4: detected capacity change from 0 to 1024 [ 264.383807][T11842] vxfs: WRONG superblock magic 00000000 at 8 [ 264.409534][T11842] vxfs: can't find superblock. [ 264.410684][T11845] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 264.468317][T11842] vxfs: WRONG superblock magic 00000000 at 1 [ 264.479444][T11845] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 264.493670][T11842] vxfs: WRONG superblock magic 00000000 at 8 [ 264.501735][T11842] vxfs: can't find superblock. [ 264.502372][T11854] loop5: detected capacity change from 0 to 1024 02:16:06 executing program 3: syz_mount_image$vxfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/file0\x00') [ 264.545156][T11845] EXT4-fs (loop4): get root inode failed [ 264.576769][T11845] EXT4-fs (loop4): mount failed [ 264.616966][T11854] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 264.652583][T11862] vxfs: WRONG superblock magic 00000000 at 1 [ 264.673168][T11862] vxfs: WRONG superblock magic 00000000 at 8 [ 264.707237][T11862] vxfs: can't find superblock. 02:16:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) 02:16:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 266.925194][T11887] loop4: detected capacity change from 0 to 1024 [ 266.978004][T11892] loop5: detected capacity change from 0 to 1024 [ 267.021139][T11887] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 267.068762][T11892] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 267.093866][T11887] EXT4-fs (loop4): corrupt root inode, run e2fsck 02:16:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 267.133385][T11887] EXT4-fs (loop4): mount failed 02:16:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) 02:16:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 267.486497][T11915] loop5: detected capacity change from 0 to 1024 [ 267.505364][T11916] loop4: detected capacity change from 0 to 1024 [ 267.518720][T11915] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 267.581221][T11916] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 02:16:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) [ 267.651027][T11916] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 267.672458][T11916] EXT4-fs (loop4): mount failed 02:16:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}], 0x81, &(0x7f0000000080)) [ 267.763881][T11927] loop5: detected capacity change from 0 to 1024 [ 267.786696][T11927] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:16:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) [ 267.937043][T11938] loop4: detected capacity change from 0 to 1024 [ 267.975792][T11938] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 02:16:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 268.015015][T11938] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 268.018076][T11942] loop5: detected capacity change from 0 to 1024 [ 268.027372][T11938] EXT4-fs (loop4): mount failed 02:16:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 268.104663][T11942] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:16:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 268.349018][T11958] loop4: detected capacity change from 0 to 1024 [ 268.400023][T11958] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 268.430539][T11958] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 268.458300][T11958] EXT4-fs (loop4): get root inode failed [ 268.464411][T11958] EXT4-fs (loop4): mount failed 02:16:12 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 270.885583][T11978] loop5: detected capacity change from 0 to 1024 [ 270.919629][T11978] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 270.951687][T11985] loop4: detected capacity change from 0 to 1024 02:16:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) [ 271.031492][T11985] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 271.115961][T11985] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 271.156944][T12000] loop5: detected capacity change from 0 to 1024 [ 271.173544][T12000] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 271.271744][T11985] EXT4-fs (loop4): get root inode failed [ 271.277421][T11985] EXT4-fs (loop4): mount failed 02:16:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:13 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 271.479072][T12009] loop5: detected capacity change from 0 to 1024 [ 271.522818][T12009] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 271.563192][T12016] loop4: detected capacity change from 0 to 1024 [ 271.606147][T12016] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) 02:16:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 271.662738][T12016] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 271.748147][T12016] EXT4-fs (loop4): get root inode failed [ 271.771088][T12016] EXT4-fs (loop4): mount failed 02:16:16 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:16 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 275.012762][T12041] loop5: detected capacity change from 0 to 1024 [ 275.020571][T12042] loop4: detected capacity change from 0 to 1024 [ 275.039676][T12041] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 275.110159][T12042] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:16:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) [ 275.176620][T12054] loop3: detected capacity change from 0 to 1024 [ 275.193546][T12054] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 275.195851][T12042] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 275.236099][T12054] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 275.303834][T12054] EXT4-fs (loop3): get root inode failed [ 275.336102][T12054] EXT4-fs (loop3): mount failed [ 275.352534][T12042] EXT4-fs (loop4): get root inode failed 02:16:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 275.391526][T12042] EXT4-fs (loop4): mount failed 02:16:17 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 275.440375][T12063] loop5: detected capacity change from 0 to 1024 [ 275.486888][T12063] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:16:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) [ 275.703867][T12078] loop3: detected capacity change from 0 to 1024 [ 275.730177][T12080] loop4: detected capacity change from 0 to 1024 [ 275.753969][T12082] loop5: detected capacity change from 0 to 1024 [ 275.768672][T12078] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 275.770066][T12080] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 275.804445][T12082] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 275.826484][T12080] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 275.827836][T12078] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 275.858862][T12080] EXT4-fs (loop4): get root inode failed [ 275.870736][T12080] EXT4-fs (loop4): mount failed [ 275.897322][T12078] EXT4-fs (loop3): get root inode failed [ 275.904983][T12078] EXT4-fs (loop3): mount failed 02:16:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) 02:16:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) 02:16:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:19 executing program 1: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 277.603074][T12110] loop5: detected capacity change from 0 to 1024 [ 277.629988][T12110] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 277.634132][T12117] loop4: detected capacity change from 0 to 1024 [ 277.655643][T12116] loop3: detected capacity change from 0 to 1024 [ 277.667128][T12117] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 277.703439][T12117] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 277.719575][T12116] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 277.733997][T12117] EXT4-fs (loop4): get root inode failed [ 277.799191][T12117] EXT4-fs (loop4): mount failed 02:16:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) [ 277.909729][T12116] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 277.925505][T12116] EXT4-fs (loop3): get root inode failed [ 277.934102][T12116] EXT4-fs (loop3): mount failed 02:16:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 278.067442][T12136] loop5: detected capacity change from 0 to 1024 02:16:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 278.120118][T12136] EXT4-fs (loop5): invalid first ino: 0 [ 278.171983][T12140] loop4: detected capacity change from 0 to 1024 [ 278.195989][T12140] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:16:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) [ 278.221726][T12140] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 278.235530][T12140] EXT4-fs (loop4): get root inode failed [ 278.243876][T12140] EXT4-fs (loop4): mount failed [ 278.264869][T12145] loop3: detected capacity change from 0 to 1024 02:16:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 278.433469][T12154] loop5: detected capacity change from 0 to 1024 [ 278.484402][T12154] EXT4-fs (loop5): invalid first ino: 0 [ 278.541047][T12160] loop3: detected capacity change from 0 to 1024 02:16:22 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) 02:16:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) 02:16:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:22 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 280.401080][T12181] loop3: detected capacity change from 0 to 1024 [ 280.428000][T12185] loop5: detected capacity change from 0 to 1024 [ 280.441602][T12183] loop4: detected capacity change from 0 to 1024 02:16:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 280.499632][T12185] EXT4-fs (loop5): invalid first ino: 0 [ 280.502550][T12183] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 280.545249][T12183] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) [ 280.626035][T12183] EXT4-fs (loop4): get root inode failed 02:16:22 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 280.717995][T12183] EXT4-fs (loop4): mount failed [ 280.745160][T12202] loop3: detected capacity change from 0 to 1024 02:16:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 280.833573][T12206] loop5: detected capacity change from 0 to 1024 [ 280.923964][T12206] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 280.993477][T12216] loop4: detected capacity change from 0 to 1024 [ 281.005278][T12219] loop3: detected capacity change from 0 to 1024 [ 281.045136][T12216] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 281.144390][T12216] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 281.204763][T12216] EXT4-fs (loop4): get root inode failed [ 281.251216][T12216] EXT4-fs (loop4): mount failed 02:16:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) 02:16:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) 02:16:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:25 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 283.602816][T12253] loop5: detected capacity change from 0 to 1024 [ 283.602895][T12251] loop4: detected capacity change from 0 to 1024 [ 283.619371][T12252] loop3: detected capacity change from 0 to 1024 [ 283.651530][T12253] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 283.665429][T12251] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:16:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 283.732217][T12251] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 283.818023][T12251] EXT4-fs (loop4): get root inode failed 02:16:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) [ 283.914504][T12251] EXT4-fs (loop4): mount failed 02:16:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 283.948063][T12273] loop3: detected capacity change from 0 to 8 02:16:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 284.014430][T12273] EXT4-fs (loop3): bad geometry: block count 99 exceeds size of device (4 blocks) [ 284.053922][T12277] loop5: detected capacity change from 0 to 1024 [ 284.096129][T12277] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 02:16:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) [ 284.280465][T12288] loop4: detected capacity change from 0 to 1024 [ 284.332228][T12288] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 284.390533][T12288] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 284.446800][T12296] loop3: detected capacity change from 0 to 8 [ 284.457558][T12295] loop5: detected capacity change from 0 to 1024 [ 284.466270][T12296] EXT4-fs (loop3): bad geometry: block count 99 exceeds size of device (4 blocks) [ 284.466867][T12288] EXT4-fs (loop4): get root inode failed [ 284.603685][T12295] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 284.609095][T12288] EXT4-fs (loop4): mount failed 02:16:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}], 0x81, &(0x7f0000000080)) 02:16:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 286.734629][T12323] loop3: detected capacity change from 0 to 8 [ 286.751512][T12322] loop4: detected capacity change from 0 to 1024 [ 286.772873][T12328] loop5: detected capacity change from 0 to 1024 [ 286.773039][T12323] EXT4-fs (loop3): bad geometry: block count 99 exceeds size of device (4 blocks) [ 286.800759][T12322] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 286.828532][T12328] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 286.846290][T12322] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 286.868444][T12322] EXT4-fs (loop4): get root inode failed [ 286.875261][T12322] EXT4-fs (loop4): mount failed 02:16:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) 02:16:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 287.130087][T12346] loop4: detected capacity change from 0 to 1024 [ 287.147656][T12347] loop5: detected capacity change from 0 to 1024 [ 287.178003][T12346] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 287.207883][T12347] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 02:16:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) [ 287.232700][T12346] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000080)) [ 287.297165][T12346] EXT4-fs (loop4): get root inode failed [ 287.368162][T12346] EXT4-fs (loop4): mount failed 02:16:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) 02:16:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000080)) 02:16:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 290.077976][T12390] loop5: detected capacity change from 0 to 1024 [ 290.111858][T12394] loop3: detected capacity change from 0 to 1024 [ 290.123094][T12395] loop4: detected capacity change from 0 to 1024 [ 290.143751][T12390] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 290.166701][T12395] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 290.178626][T12394] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 290.271952][T12395] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 290.284477][T12394] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 290.323996][T12395] EXT4-fs (loop4): get root inode failed [ 290.333376][T12395] EXT4-fs (loop4): mount failed [ 290.348265][T12394] EXT4-fs (loop3): get root inode failed [ 290.354855][T12394] EXT4-fs (loop3): mount failed 02:16:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) 02:16:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}], 0x81, &(0x7f0000000080)) 02:16:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 290.633923][T12421] loop5: detected capacity change from 0 to 1024 [ 290.634231][T12420] loop4: detected capacity change from 0 to 1024 [ 290.648917][T12422] loop3: detected capacity change from 0 to 1024 [ 290.698942][T12421] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 290.717958][T12420] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 290.728533][T12422] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 290.764337][T12420] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 290.786766][T12422] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 290.796277][T12420] EXT4-fs (loop4): get root inode failed 02:16:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 290.811031][T12420] EXT4-fs (loop4): mount failed 02:16:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) [ 290.840632][T12422] EXT4-fs (loop3): get root inode failed [ 290.847598][T12422] EXT4-fs (loop3): mount failed [ 291.080307][T12442] loop5: detected capacity change from 0 to 1024 [ 291.108742][T12442] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 02:16:33 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)) 02:16:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) [ 291.305203][T12453] loop3: detected capacity change from 0 to 1024 [ 291.338024][T12453] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 291.350482][T12457] loop5: detected capacity change from 0 to 1024 [ 291.363915][T12458] loop4: detected capacity change from 0 to 1024 [ 291.394162][T12453] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 291.413907][T12457] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 291.427493][T12458] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 291.448894][T12453] EXT4-fs (loop3): get root inode failed [ 291.455397][T12453] EXT4-fs (loop3): mount failed 02:16:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) [ 291.493422][T12458] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, &(0x7f0000000080)) [ 291.552366][T12458] EXT4-fs (loop4): get root inode failed [ 291.581344][T12458] EXT4-fs (loop4): mount failed [ 291.679033][T12474] loop5: detected capacity change from 0 to 1024 02:16:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 291.726145][T12474] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 02:16:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 291.796483][T12481] loop3: detected capacity change from 0 to 1024 [ 291.855474][T12481] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 291.881009][T12485] loop4: detected capacity change from 0 to 1024 02:16:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) [ 291.904861][T12481] EXT4-fs error (device loop3): ext4_fill_super:4956: inode #2: comm syz-executor.3: iget: root inode unallocated [ 291.935515][T12485] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 291.972997][T12481] EXT4-fs (loop3): get root inode failed [ 291.997305][T12485] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 292.015227][T12481] EXT4-fs (loop3): mount failed [ 292.029386][T12496] loop5: detected capacity change from 0 to 1024 [ 292.058726][T12485] EXT4-fs (loop4): get root inode failed [ 292.085548][T12485] EXT4-fs (loop4): mount failed [ 292.126541][T12496] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 02:16:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) 02:16:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) 02:16:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 294.572110][T12523] loop4: detected capacity change from 0 to 1024 [ 294.585364][T12525] loop5: detected capacity change from 0 to 1024 [ 294.591415][T12526] loop3: detected capacity change from 0 to 1024 [ 294.635462][T12523] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 294.655639][T12525] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:16:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 294.676581][T12523] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 294.683421][T12526] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.705172][T12523] EXT4-fs (loop4): get root inode failed [ 294.711448][T12523] EXT4-fs (loop4): mount failed 02:16:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) 02:16:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) 02:16:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 295.039469][T12549] loop5: detected capacity change from 0 to 1024 [ 295.052621][T12551] loop4: detected capacity change from 0 to 1024 [ 295.073684][T12551] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 295.077317][T12553] loop3: detected capacity change from 0 to 1024 [ 295.093397][T12551] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 295.113604][T12549] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 295.117789][T12551] EXT4-fs (loop4): get root inode failed [ 295.126269][T12551] EXT4-fs (loop4): mount failed [ 295.163254][T12553] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:16:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) [ 295.428178][T12568] loop5: detected capacity change from 0 to 1024 [ 295.455099][T12568] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 02:16:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, &(0x7f0000000200), 0x81, &(0x7f0000000080)) 02:16:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:16:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:16:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 297.757167][T12592] loop3: detected capacity change from 0 to 1024 [ 297.768279][T12595] loop4: detected capacity change from 0 to 1024 [ 297.776759][T12596] loop5: detected capacity change from 0 to 1024 [ 297.827941][T12596] EXT4-fs (loop5): Can't support bigalloc feature without extents feature [ 297.827941][T12596] [ 297.839143][T12595] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 297.841552][T12592] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 297.881117][T12595] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 297.947379][T12595] EXT4-fs (loop4): get root inode failed [ 297.954360][T12595] EXT4-fs (loop4): mount failed 02:16:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:16:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 298.185511][T12612] loop3: detected capacity change from 0 to 1024 [ 298.281111][T12618] loop5: detected capacity change from 0 to 1024 [ 298.289724][T12612] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 298.317083][T12622] loop4: detected capacity change from 0 to 1024 [ 298.342241][T12618] EXT4-fs (loop5): Can't support bigalloc feature without extents feature [ 298.342241][T12618] [ 298.379137][T12622] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) 02:16:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) [ 298.411628][T12622] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 298.467080][T12622] EXT4-fs (loop4): get root inode failed [ 298.482411][T12631] loop3: detected capacity change from 0 to 1024 [ 298.499450][T12631] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 298.527255][T12622] EXT4-fs (loop4): mount failed 02:16:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:16:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000200)={0x0, 0x1b000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 300.918627][T12660] loop3: detected capacity change from 0 to 1024 [ 300.932866][T12663] loop4: detected capacity change from 0 to 1024 [ 300.942387][T12664] loop5: detected capacity change from 0 to 1024 [ 300.986579][T12663] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 300.991877][T12660] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 301.022952][T12663] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 301.027668][T12664] EXT4-fs (loop5): Can't support bigalloc feature without extents feature [ 301.027668][T12664] [ 301.046472][T12663] EXT4-fs (loop4): get root inode failed [ 301.060905][T12663] EXT4-fs (loop4): mount failed 02:16:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) 02:16:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:43 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) [ 301.526084][T12687] loop5: detected capacity change from 0 to 1024 [ 301.536036][T12690] loop4: detected capacity change from 0 to 1024 [ 301.537109][T12689] loop3: detected capacity change from 0 to 1024 02:16:43 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/4096, 0x1000) [ 301.583129][T12689] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 301.597227][T12690] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 301.651041][T12690] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 301.702827][T12690] EXT4-fs (loop4): get root inode failed [ 301.746140][T12690] EXT4-fs (loop4): mount failed 02:16:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) 02:16:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:43 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 02:16:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000000000002", 0xc, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 302.044349][T12711] loop5: detected capacity change from 0 to 1024 [ 302.045368][T12713] loop3: detected capacity change from 0 to 1024 [ 302.063299][T12714] loop4: detected capacity change from 0 to 1024 02:16:44 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f00000000c0)={0x9}) shutdown(r0, 0x2) [ 302.110824][T12713] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 302.115783][T12714] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:16:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) [ 302.154191][T12714] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 302.205619][T12714] EXT4-fs (loop4): get root inode failed [ 302.241333][T12714] EXT4-fs (loop4): mount failed 02:16:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x81, &(0x7f0000000080)) 02:16:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:44 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1000, 0x0, 0x0) [ 302.394454][T12729] loop5: detected capacity change from 0 to 1024 [ 302.454595][T12734] loop3: detected capacity change from 0 to 1024 [ 302.472152][T12734] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:16:44 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f00000001c0)='./file1\x00', 0x1) [ 302.528501][T12738] loop4: detected capacity change from 0 to 1024 [ 302.568458][T12738] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57356!=0) [ 302.698609][T12738] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:16:46 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) 02:16:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:46 executing program 5: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x3) 02:16:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:46 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f00000001c0)='./file1\x00', 0x1) [ 304.201203][T12761] loop4: detected capacity change from 0 to 1024 [ 304.218977][T12764] loop3: detected capacity change from 0 to 1024 02:16:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f0000000040)) [ 304.254524][T12761] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 304.289188][T12764] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:16:46 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f00000001c0)='./file1\x00', 0x1) [ 304.321979][T12761] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:46 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) faccessat(r1, &(0x7f00000001c0)='./file1\x00', 0x1) 02:16:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) [ 304.425292][T12761] EXT4-fs (loop4): get root inode failed 02:16:46 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 304.476807][T12761] EXT4-fs (loop4): mount failed 02:16:46 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) [ 304.601315][T12782] loop3: detected capacity change from 0 to 1024 [ 304.715833][T12782] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:16:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:47 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x20, 0x0) pselect6(0x40, &(0x7f0000000400), 0x0, &(0x7f0000000480)={0x8}, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, &(0x7f0000000080)={0x9}, 0x0, 0x0) 02:16:47 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000080)="24bacd17516779ee78fae08430c35eaae70ae895efa0277c9e31008b056c874e34af9fbb8f490343427e74e93e336c14d796c373c5b7811d66044df26abaf54b1ce44cd5dd23b6a48c5088c2ae95d59c0dcbbedcf77bcce8a031ba78afdb8747695f2ac3fa5333bbfba8e5b6c49cdc3ebabd0d050651e154257fa501f4", 0x7d}, {&(0x7f0000000140)="b082a3809d7af3123315", 0xa}, {0x0}, {&(0x7f0000000180), 0x0, 0x1}, {&(0x7f00000013c0)="45547e5a24370efaa5ba78acc55f4a998631a5496c9ce14fdb12fd6eb7cb870cd07e14cf02e1fac4dc7ac9a0f1f5d98ea6e6e1df902220", 0x37, 0x763f}], 0x284800, &(0x7f0000000300)={[], [{@dont_measure}]}) 02:16:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}], 0x81, &(0x7f0000000080)) 02:16:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 306.172310][T12806] loop5: detected capacity change from 0 to 118 [ 306.194004][T12808] loop3: detected capacity change from 0 to 1024 [ 306.212367][T12811] loop4: detected capacity change from 0 to 1024 02:16:48 executing program 2: socket$inet6(0xa, 0x1, 0xbd73) [ 306.279618][T12808] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 306.304558][T12811] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 306.317562][T12806] loop5: detected capacity change from 0 to 118 02:16:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001540)={'batadv_slave_0\x00'}) [ 306.411737][T12811] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:48 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/91) 02:16:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) [ 306.474024][T12811] EXT4-fs (loop4): get root inode failed [ 306.541015][T12811] EXT4-fs (loop4): mount failed 02:16:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0xe}, 0x40) [ 306.801901][T12831] loop3: detected capacity change from 0 to 1024 [ 306.889240][T12831] EXT4-fs (loop3): invalid first ino: 0 [ 306.959490][T12836] loop4: detected capacity change from 0 to 1024 [ 307.036230][T12836] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 307.167750][T12836] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 307.238074][T12836] EXT4-fs (loop4): get root inode failed [ 307.243847][T12836] EXT4-fs (loop4): mount failed 02:16:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @nfc, @xdp, @qipcrtr}) 02:16:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) 02:16:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:16:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 307.493633][T12853] loop3: detected capacity change from 0 to 1024 [ 307.520406][T12857] loop4: detected capacity change from 0 to 1024 02:16:49 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='fsi_master_gpio_crc_cmd_error\x00'}, 0x10) 02:16:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x4, 0x4, 0xfffffffc, 0x2, 0x1}, 0x40) [ 307.549281][T12853] EXT4-fs (loop3): invalid first ino: 0 [ 307.572339][T12857] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 307.626611][T12857] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}], 0x81, &(0x7f0000000080)) 02:16:49 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180), r0) [ 307.681810][T12857] EXT4-fs (loop4): get root inode failed 02:16:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000300)={0xed53, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) [ 307.737694][T12857] EXT4-fs (loop4): mount failed 02:16:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 307.912878][T12877] loop3: detected capacity change from 0 to 1024 [ 307.975254][T12877] EXT4-fs (loop3): invalid first ino: 0 [ 308.047050][T12881] loop4: detected capacity change from 0 to 1024 [ 308.087836][T12881] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 308.183375][T12881] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 308.217616][T12881] EXT4-fs (loop4): get root inode failed [ 308.223398][T12881] EXT4-fs (loop4): mount failed 02:16:51 executing program 5: r0 = fork() r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/random', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 02:16:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000140), 0x4) 02:16:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) 02:16:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 309.388450][T12900] loop4: detected capacity change from 0 to 1024 [ 309.406206][T12903] loop3: detected capacity change from 0 to 1024 [ 309.454379][T12900] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) 02:16:51 executing program 2: add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x2, 0x61, 0x65, 0xe, 0x39, 0x61, 0x63, 0x66, 0x66, 0x34, 0x37, 0x62, 0x39, 0x63, 0x0, 0x31]}, &(0x7f0000000200)={0x0, "a609bade14f8a29183bc78e108ee37ecd7016cf5db3fb086bc745fb0942781eb535e2ed0bae62098a838391a96ddb1dbd80db36fae8cbe7e89c64c7d2998bf8a"}, 0x48, 0xfffffffffffffffc) 02:16:51 executing program 5: socket$inet(0x2, 0x8080a, 0x0) [ 309.499004][T12903] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 309.524585][T12900] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 309.594986][T12900] EXT4-fs (loop4): get root inode failed [ 309.623809][T12900] EXT4-fs (loop4): mount failed 02:16:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) 02:16:51 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/158) 02:16:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 309.796317][T12919] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 02:16:51 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4a}) [ 309.848473][T12920] loop3: detected capacity change from 0 to 1024 [ 309.911300][T12920] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 02:16:51 executing program 2: shmat(0x0, &(0x7f0000000000/0x3000)=nil, 0x7000) openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x3000)=nil, 0x7000) 02:16:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x81, &(0x7f0000000080)) [ 310.005333][T12929] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability [ 310.006358][T12927] loop4: detected capacity change from 0 to 1024 02:16:52 executing program 5: keyctl$KEYCTL_MOVE(0xc, 0x0, 0x0, 0x0, 0x0) [ 310.124394][T12927] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 310.198838][T12927] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 310.205915][T12937] loop3: detected capacity change from 0 to 1024 [ 310.227869][T12927] EXT4-fs (loop4): get root inode failed [ 310.233674][T12927] EXT4-fs (loop4): mount failed [ 310.299244][T12937] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 02:16:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x40) 02:16:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0xc001, 0x8, 0x0, 0x1}, 0x40) 02:16:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, &(0x7f00000001c0)) [ 311.074377][T12962] loop4: detected capacity change from 0 to 1024 [ 311.103702][T12962] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) 02:16:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 311.129743][T12966] loop3: detected capacity change from 0 to 1024 [ 311.153866][T12962] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:53 executing program 5: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) [ 311.173184][T12966] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 02:16:53 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000440)={0x0, 0x0, 'client1\x00', 0x0, "7a0b4d09ed26d22f", "706242a6fb4b2d57811f82671783f596ab42f11c32a9755b15993ec42412fe68"}) [ 311.251079][T12962] EXT4-fs (loop4): get root inode failed [ 311.259041][T12962] EXT4-fs (loop4): mount failed 02:16:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, 0x0) 02:16:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:53 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 311.540743][T12986] loop4: detected capacity change from 0 to 1024 [ 311.554693][T12986] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 311.573337][T12986] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 311.591854][T12986] EXT4-fs (loop4): get root inode failed [ 311.595438][T12990] loop3: detected capacity change from 0 to 1024 [ 311.606244][T12986] EXT4-fs (loop4): mount failed [ 311.659728][T12990] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 02:16:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0x1}, 0x40) 02:16:56 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)) 02:16:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}], 0x81, &(0x7f0000000080)) 02:16:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x300, 0x11, 0x0, 0x0) 02:16:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5412, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, "29e4ad2660da7aa093a301bb3cf3586ff3d128"}) [ 314.916969][T13011] loop3: detected capacity change from 0 to 1024 [ 314.952824][T13012] loop4: detected capacity change from 0 to 1024 [ 314.962428][T13011] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 314.998295][T13012] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) 02:16:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) [ 315.069827][T13012] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated 02:16:57 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x0, 0x0, 0x1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) 02:16:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:16:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x40) [ 315.175153][T13012] EXT4-fs (loop4): get root inode failed [ 315.249671][T13012] EXT4-fs (loop4): mount failed [ 315.260785][T13028] loop3: detected capacity change from 0 to 1024 [ 315.268344][ T37] audit: type=1326 audit(1628043417.146:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13025 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 315.326222][T13028] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 315.415956][ T37] audit: type=1326 audit(1628043417.246:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13025 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 316.862765][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.869158][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 02:16:59 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:16:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:16:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3, &(0x7f0000000280)={{{@in6=@private1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xe8) 02:16:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) 02:16:59 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmmsg$nfc_llcp(r0, 0x0, 0x0, 0x0) 02:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 317.516103][T13065] loop3: detected capacity change from 0 to 1024 [ 317.519476][T13066] loop4: detected capacity change from 0 to 1024 02:16:59 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x243, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1f, {0x9}}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54c, 0x374, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 02:16:59 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0xfffffe15) [ 317.568425][T13065] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 317.603492][T13066] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 317.626107][T13066] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 317.648483][T13066] EXT4-fs (loop4): get root inode failed 02:16:59 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x40000, 0x0) [ 317.689935][T13066] EXT4-fs (loop4): mount failed 02:16:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}], 0x81, &(0x7f0000000080)) 02:16:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 317.936353][ T9666] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 317.988829][T13086] loop3: detected capacity change from 0 to 1024 02:16:59 executing program 2: perf_event_open(&(0x7f0000005dc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) [ 318.032306][T13087] loop4: detected capacity change from 0 to 1024 [ 318.071966][T13086] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 318.107631][T13087] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 318.176332][T13087] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 318.186428][ T9666] usb 6-1: Using ep0 maxpacket: 16 [ 318.250531][T13087] EXT4-fs (loop4): get root inode failed [ 318.307237][ T9666] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 318.321044][T13087] EXT4-fs (loop4): mount failed [ 318.527044][ T9666] usb 6-1: New USB device found, idVendor=05ac, idProduct=0243, bcdDevice= 0.40 [ 318.555765][ T9666] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 318.584031][ T9666] usb 6-1: Product: syz [ 318.605123][ T9666] usb 6-1: Manufacturer: syz [ 318.622983][ T9666] usb 6-1: SerialNumber: syz [ 318.857525][ T9564] Bluetooth: hci2: command 0x0406 tx timeout [ 318.863603][ T9564] Bluetooth: hci5: command 0x0406 tx timeout [ 318.938521][ T9564] Bluetooth: hci0: command 0x0406 tx timeout [ 318.976241][ T9564] Bluetooth: hci1: command 0x0406 tx timeout [ 318.982334][ T9564] Bluetooth: hci3: command 0x0406 tx timeout [ 318.989603][ T9564] Bluetooth: hci4: command 0x0406 tx timeout [ 318.999170][ T9666] usbhid 6-1:1.0: couldn't find an input interrupt endpoint [ 319.044614][ T9666] usb 6-1: USB disconnect, device number 2 02:17:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) 02:17:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 02:17:01 executing program 5: perf_event_open(&(0x7f0000005dc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 319.578367][T13122] loop3: detected capacity change from 0 to 1024 [ 319.591691][T13124] loop4: detected capacity change from 0 to 1024 02:17:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f00000000c0)={'wlan1\x00', @ifru_flags}) [ 319.637102][T13122] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 319.659613][T13124] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) 02:17:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 319.697811][T13124] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 319.746404][T13124] EXT4-fs (loop4): get root inode failed [ 319.782437][T13124] EXT4-fs (loop4): mount failed 02:17:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) 02:17:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000180)=0x54) 02:17:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:01 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) accept$nfc_llcp(r0, 0x0, 0x0) [ 320.005397][T13142] loop3: detected capacity change from 0 to 1024 [ 320.049930][T13142] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 320.128453][T13149] loop4: detected capacity change from 0 to 1024 [ 320.150586][T13149] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 320.179746][T13149] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 320.258831][T13149] EXT4-fs (loop4): get root inode failed [ 320.270286][T13149] EXT4-fs (loop4): mount failed 02:17:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}], 0x81, &(0x7f0000000080)) 02:17:04 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003e80)={0x77359400}) sched_rr_get_interval(0x0, &(0x7f0000003ec0)) 02:17:04 executing program 5: syz_open_dev$vcsu(&(0x7f00000001c0), 0x35, 0x38000) 02:17:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 322.592543][T13177] loop3: detected capacity change from 0 to 1024 02:17:04 executing program 5: io_setup(0x5af, &(0x7f0000000000)) io_setup(0x80, &(0x7f0000000100)) io_setup(0x20, &(0x7f00000000c0)) io_setup(0x2, &(0x7f0000000080)) io_setup(0x5109, &(0x7f0000000040)) [ 322.635378][T13182] loop4: detected capacity change from 0 to 1024 [ 322.645790][T13177] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 02:17:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f0000000580)) [ 322.694415][T13182] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (57241!=0) [ 322.741792][T13182] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 322.777698][T13182] EXT4-fs (loop4): get root inode failed [ 322.784090][T13182] EXT4-fs (loop4): mount failed 02:17:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) 02:17:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x68, r1, 0x101, 0x0, 0x0, {{}, {}, {0x9, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 02:17:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 323.053786][T13201] loop3: detected capacity change from 0 to 1024 02:17:04 executing program 2: futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 323.096774][T13203] loop4: detected capacity change from 0 to 1024 [ 323.129393][T13201] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:17:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) [ 323.139449][T13203] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 323.164445][T13203] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 323.228773][T13203] EXT4-fs (loop4): get root inode failed [ 323.234571][T13203] EXT4-fs (loop4): mount failed 02:17:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)) 02:17:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x8000000) [ 323.467917][T13218] loop3: detected capacity change from 0 to 1024 [ 323.577443][T13218] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 323.709229][T13226] loop4: detected capacity change from 0 to 1024 [ 323.764746][T13226] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 323.811938][T13226] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 323.880387][T13226] EXT4-fs (loop4): get root inode failed [ 323.890189][T13226] EXT4-fs (loop4): mount failed 02:17:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:05 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000680), 0x200000, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) 02:17:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}], 0x81, &(0x7f0000000080)) 02:17:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000000)={'gre0\x00', @ifru_flags}) 02:17:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 324.134620][T13241] loop4: detected capacity change from 0 to 1024 [ 324.135537][T13242] loop3: detected capacity change from 0 to 1024 02:17:06 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x91140, 0x0) 02:17:06 executing program 5: io_setup(0x5af, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x5109, &(0x7f0000000040)=0x0) io_destroy(r1) [ 324.193655][T13241] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (4223!=0) [ 324.239130][T13242] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 324.243941][T13241] EXT4-fs error (device loop4): ext4_fill_super:4956: inode #2: comm syz-executor.4: iget: root inode unallocated [ 324.306610][T13241] EXT4-fs (loop4): get root inode failed [ 324.312602][T13241] EXT4-fs (loop4): mount failed 02:17:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:17:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:06 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x18) 02:17:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) [ 324.640304][T13262] loop3: detected capacity change from 0 to 1024 [ 324.693868][T13262] EXT4-fs (loop3): Can't support bigalloc feature without extents feature [ 324.693868][T13262] [ 324.736687][T13268] loop4: detected capacity change from 0 to 1024 [ 324.790311][T13268] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:07 executing program 2: getresuid(&(0x7f0000001080), 0x0, 0x0) 02:17:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:17:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x68, r1, 0x101, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 325.361686][T13284] loop3: detected capacity change from 0 to 1024 [ 325.371951][T13285] loop4: detected capacity change from 0 to 1024 02:17:07 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0xa34552b0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="91d91c81d8a6f4b65a264d426f318fbd8e8a6f94224ae29e0c89808682a66462148c5922ac1c312a5dbb907cd1ca470cbe13c5697a8a12e64a1e11901529b7b4418b193c12d929e490d22fd76b20a70cce32c5c056f99950670132d5b42b563a24a7e22cf3e2d387b0495eeaab6aa147f7f49ecc48211d9955479eacfe1f3696c51273345f9eff6d81db6100"/151, &(0x7f00000000c0)=@udp}, 0x45) [ 325.419710][T13285] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 325.430193][T13284] EXT4-fs (loop3): Can't support bigalloc feature without extents feature [ 325.430193][T13284] 02:17:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x0, &(0x7f0000000080)) 02:17:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000040)={'ip6_vti0\x00', @ifru_flags}) 02:17:07 executing program 2: syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2018050, &(0x7f00000001c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@default_permissions}], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@audit}, {@uid_gt={'uid>', 0xee00}}, {@audit}, {@smackfsdef={'smackfsdef', 0x3d, 'cgroup\x00'}}]}}) [ 325.793983][T13305] loop4: detected capacity change from 0 to 1024 [ 325.827097][T13307] loop3: detected capacity change from 0 to 1024 [ 325.853103][T13305] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 325.863314][T13306] fuse: Bad value for 'fd' [ 325.888431][T13307] EXT4-fs (loop3): Can't support bigalloc feature without extents feature [ 325.888431][T13307] [ 325.902493][T13306] fuse: Bad value for 'fd' 02:17:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 02:17:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) 02:17:08 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:08 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "828f748281d2339bd8e034535f4958c4a2ff6ab0859e026b3b53a3349d1b5ddd9adfe5f33fe18469939a65fa6a31808cba4ccb4a184e70a4423839259c022c"}, 0x60, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f00000002c0)={0x10}, 0x10}, 0x0) 02:17:08 executing program 2: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) [ 327.032379][T13334] loop4: detected capacity change from 0 to 1024 [ 327.037974][T13333] loop3: detected capacity change from 0 to 1024 [ 327.060343][T13334] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) 02:17:09 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 02:17:09 executing program 2: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000280)={{0x0, 0x2710}, {0x0, r0/1000+60000}}, &(0x7f00000002c0)) [ 327.375262][T13352] loop4: detected capacity change from 0 to 1024 [ 327.385779][T13353] loop3: detected capacity change from 0 to 1024 [ 327.444975][T13352] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:11 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}], 0x81, 0x0) 02:17:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x2, 0x13, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x16}]}, 0x18}}, 0x0) 02:17:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:11 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 02:17:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 329.607330][T13375] loop3: detected capacity change from 0 to 1024 [ 329.629600][T13379] loop4: detected capacity change from 0 to 1024 02:17:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) [ 329.725057][T13379] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f00000001c0)=0x81, 0x4) 02:17:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:11 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x2, &(0x7f0000003800)=[{&(0x7f0000000180)="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", 0xfa8, 0x59}, {&(0x7f0000001240)="f6", 0x1, 0x8001}], 0x0, 0x0) 02:17:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x68, r1, 0x101, 0x0, 0x0, {{}, {0x0, 0x6}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 02:17:11 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000080)='$', 0x1}, {&(0x7f0000000140)="b0", 0x1}, {&(0x7f00000003c0)="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", 0xc41}, {0x0}, {&(0x7f00000013c0)='E', 0x1, 0x763f}], 0x0, &(0x7f0000000300)) [ 330.104622][T13394] loop4: detected capacity change from 0 to 1024 [ 330.112736][T13396] loop3: detected capacity change from 0 to 128 [ 330.230079][T13394] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 330.335870][T13402] loop2: detected capacity change from 0 to 118 [ 330.476503][T13402] loop2: detected capacity change from 0 to 118 02:17:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:15 executing program 3: socketpair(0x28, 0x0, 0x0, &(0x7f0000001600)) 02:17:15 executing program 5: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ff7000/0x4000)=nil, 0x4000, &(0x7f0000000180)=""/109) 02:17:15 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4b47, 0x0) 02:17:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) [ 333.461186][T13426] loop4: detected capacity change from 0 to 1024 02:17:15 executing program 2: clock_getres(0x0, &(0x7f0000000240)) [ 333.508402][T13426] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, &(0x7f0000000240), 0x0) 02:17:15 executing program 3: socket$inet6_icmp(0xa, 0x2, 0x3a) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00), 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) 02:17:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:15 executing program 2: io_setup(0x5af, &(0x7f0000000000)) io_setup(0x5109, &(0x7f0000000040)=0x0) io_setup(0x78, &(0x7f0000000080)) io_destroy(r0) 02:17:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) [ 333.802281][T13446] loop4: detected capacity change from 0 to 1024 [ 333.867090][T13446] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:17 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 02:17:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[], 0x89) recvmsg$unix(r0, &(0x7f00000005c0)={&(0x7f00000001c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000580)}, 0x0) 02:17:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 02:17:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 335.824193][T13475] loop4: detected capacity change from 0 to 1024 02:17:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, &(0x7f0000000100)) [ 335.869963][T13475] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:17 executing program 5: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0x6, 0xa}}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x3}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x0, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x0, 0x0, 0x8}}}}}}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000100)={0xa}, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 02:17:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x0, 0x0, 0x0, 0x4) 02:17:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:17 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0}, 0x0) [ 336.180928][T13497] loop4: detected capacity change from 0 to 1024 [ 336.201308][T13496] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 336.365227][ T9564] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 336.385182][T13497] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 336.785745][ T9564] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 336.811836][ T9564] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 336.842560][ T9564] usb 6-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 336.875293][ T9564] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 336.911420][ T9564] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 337.222201][ T9564] usb 6-1: string descriptor 0 read error: -22 [ 337.235056][ T9564] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 337.244286][ T9564] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 337.725928][ T9564] cdc_ncm 6-1:1.0: bind() failure [ 337.788219][ T9564] cdc_ncm 6-1:1.1: CDC Union missing and no IAD found [ 337.883075][ T9564] cdc_ncm 6-1:1.1: bind() failure [ 337.939455][ T9564] usb 6-1: USB disconnect, device number 3 02:17:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:20 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x6, 0x0, 0x0) 02:17:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x80000001, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x4, 0x5, 0x9, 0x1, 0x4b, @private0, @mcast2, 0x7800, 0x8000, 0x4, 0x4}}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x5e, r2}) 02:17:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000200)) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000001c0)={0x3}, 0x0, 0x0) [ 338.519301][T13543] loop4: detected capacity change from 0 to 1024 02:17:20 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000001480)='.\x00', 0x0, 0x0, 0x1000) 02:17:20 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000011c0), 0x0, 0x0) timerfd_gettime(r0, 0x0) [ 338.582763][T13543] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:20 executing program 2: syz_open_dev$mouse(&(0x7f00000002c0), 0x9, 0x600) 02:17:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:20 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000004c0)={0x41}, 0x10) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) 02:17:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 338.915938][T13563] loop4: detected capacity change from 0 to 1024 [ 338.940296][T13563] EXT4-fs (loop4): invalid first ino: 0 02:17:22 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:22 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x10) 02:17:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11}, 0x40) 02:17:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000004c0)={0x41}, 0x10) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) 02:17:22 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "828f748281d2339bd8e034535f4958c4a2ff6ab0859e026b3b53a3349d1b5ddd9adfe5f33fe18469939a65fa6a31808cba4ccb4a184e70a4423839259c022c"}, 0x60, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f00000002c0)={0x28, 0x0, 0x0, "77d00c228b14cb6f4c9253302cfb2d6c84"}, 0x28}, 0x0) [ 340.836050][T13595] loop4: detected capacity change from 0 to 1024 [ 340.854945][T13597] tipc: Can't bind to reserved service type 1 [ 340.874919][T13595] EXT4-fs (loop4): invalid first ino: 0 02:17:22 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000004c0)={0x41}, 0x10) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) 02:17:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000040)={@local}, 0x14) 02:17:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:23 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000004c0)={0x41}, 0x10) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) [ 341.136214][T13611] loop4: detected capacity change from 0 to 1024 [ 341.196993][T13611] EXT4-fs (loop4): invalid first ino: 0 02:17:24 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:24 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x12, 0x0, 0x0) 02:17:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000002f00)='5', 0x1, 0xc0, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) 02:17:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, 0x0) read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:24 executing program 5: io_setup(0x5af, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x7fff, 0x141002) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 343.148923][T13644] loop4: detected capacity change from 0 to 1024 02:17:25 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40086602, 0x0) 02:17:25 executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000700), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000840)='cubic\x00', 0x6) [ 343.198065][T13644] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40) 02:17:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) [ 343.443102][T13656] loop4: detected capacity change from 0 to 1024 02:17:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000007c0)={&(0x7f0000000040), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000800)=""/144, 0x90}, {&(0x7f0000000180)=""/232, 0xe8}, {&(0x7f0000000280)=""/114, 0x72}, {&(0x7f0000000300)=""/49, 0x31}, {&(0x7f0000000340)=""/60, 0x3c}, {&(0x7f0000000380)=""/112, 0x70}, {&(0x7f0000000440)=""/18, 0x12}, {&(0x7f00000004c0)=""/17, 0x11}, {&(0x7f0000000500)=""/64, 0xffffffffffffff08}, {&(0x7f0000000540)=""/243, 0xf3}], 0xa, &(0x7f0000000700)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x0) [ 343.500039][T13656] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003c00)={&(0x7f0000002900)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) 02:17:25 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmmsg$nfc_llcp(r0, &(0x7f0000005140)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "5263af757a7668c57090d733741019b1149c6c1b48ca8f7dd17591524418f4387e02ed01692915e3f8c151c528207fbeca93f36c1de7d7943cba65d7b9072c"}, 0x60, &(0x7f0000002500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}], 0x1, 0x0) 02:17:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'dummy0\x00', @ifru_flags}) 02:17:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, 0x0) read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) [ 343.962842][T13680] loop4: detected capacity change from 0 to 1024 02:17:25 executing program 2: io_setup(0x5af, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsn(&(0x7f00000012c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001480)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_getevents(r0, 0x0, 0x4, 0x0, 0x0) 02:17:25 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, 0x0) [ 344.038939][T13680] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x110}, 0xecdcd70a7b1d882e) [ 344.336374][T13698] loop4: detected capacity change from 0 to 1024 [ 344.361505][T13698] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000100), 0x4) 02:17:26 executing program 2: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:17:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, 0x0) read$FUSE(r2, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000040)={'syz_tun\x00', @ifru_flags}) 02:17:26 executing program 5: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:17:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000043c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0xfffffcf6, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xfffffffffffffe18}}], 0x1, 0x0) [ 344.994353][T13718] loop4: detected capacity change from 0 to 1024 02:17:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000, 0x0, @loopback}, 0x1c) [ 345.041123][T13718] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:27 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendmsg$nfc_llcp(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1, &(0x7f00000002c0)={0x28, 0x0, 0x0, "77d00c228b14cb6f4c9253302cfb2d6c84"}, 0x28}, 0x0) 02:17:27 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 02:17:27 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x2}, &(0x7f0000000180)={0x0, r0+60000000}, 0x0) 02:17:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x4, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="040af266", @ANYRESDEC, @ANYBLOB="000328bd7000ffdbdf25130000000c000900000000000000000005000300000000000500030005000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) [ 345.301699][T13733] loop4: detected capacity change from 0 to 1024 [ 345.344962][T13733] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}, 0x40) 02:17:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@mcast1, @mcast1, @remote}) 02:17:27 executing program 5: pselect6(0x0, 0x0, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007180)={0x0}) 02:17:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x4004801) [ 345.863470][T13758] loop4: detected capacity change from 0 to 1024 02:17:27 executing program 3: read$hiddev(0xffffffffffffffff, 0x0, 0x0) [ 345.952513][T13758] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000006a40)={0x0, 0x0, &(0x7f0000006900)=[{0x0}, {&(0x7f0000004480)=""/216, 0xd8}], 0x2}, 0x0) sendmmsg$unix(r0, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="87", 0x1}], 0x1}}], 0x1, 0x0) 02:17:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0xfc00, 0x0, @loopback}, 0x1c) [ 346.211902][T13773] loop4: detected capacity change from 0 to 1024 [ 346.300933][T13773] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:28 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000080)='$', 0x1, 0x8}, {&(0x7f0000000140)="b0", 0x1}, {&(0x7f00000003c0)="e9", 0x1}, {0x0, 0x0, 0x763f}], 0x0, &(0x7f0000000300)) 02:17:28 executing program 3: syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r0+60000000}, &(0x7f00000002c0)={&(0x7f0000000080), 0x8}) 02:17:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000", 0x63, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0xf0) 02:17:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 347.143948][T13795] loop4: detected capacity change from 0 to 1024 [ 347.165661][T13799] loop2: detected capacity change from 0 to 118 02:17:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) [ 347.206244][T13795] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 347.283540][T13799] loop2: detected capacity change from 0 to 118 02:17:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x74, 0x0, 0x0) 02:17:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:29 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) 02:17:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) [ 347.454235][T13813] loop4: detected capacity change from 0 to 1024 02:17:29 executing program 3: getresgid(&(0x7f0000008e80), 0x0, 0x0) [ 347.525609][T13813] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) 02:17:29 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000000), 0x6) 02:17:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) [ 347.839418][T13831] loop4: detected capacity change from 0 to 1024 [ 347.875714][T13831] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000400)={0x2020}, 0x2020) 02:17:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) 02:17:32 executing program 2: syz_open_dev$mouse(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 02:17:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000006a40)={0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000002cc0)=""/12, 0xc}, {&(0x7f0000004480)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) sendmmsg$unix(r0, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="87ddb498b0f0fb66ef546425f4", 0xd}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[@rights={{0x10}}], 0x10}}], 0x2, 0x0) 02:17:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b00000000010000080000000200000012", 0x65, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) [ 350.411904][T13861] loop4: detected capacity change from 0 to 1024 02:17:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000100)={&(0x7f0000000580), 0xfffffffffffffc70, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRESHEX, @ANYBLOB="100628bd7000fbdbdf2530003c0005003600e5004000000000007770616e3400000005003500070000000800020058f49b1d4906fb8fd60d5a7f54786a71820a2ff3e2002addc0300e83929b432148c8cdcd551923508989f6fedaaedb53d3716ee03cc8223f2656f10e9150128a17ef6a4170e61fa316d4f01f5cf229ea306bc7d7bf441c0962541f937c8135787ccea4a5fa4721a49141ffcd66a9a28534c4cdd9835b06481917cac7d2bf5222016564fd26cd53945651548b1299649872d87b40b58f590b4a917e6689d0dd7a59d05f6e792775e0149eefafba46dff672b034a2533b0bf41fd06c3c6af5c038cbace395198188f8841cbfc1a76a604362e500f269da", @ANYRES32=0x0, @ANYBLOB="0a0001007770616e310000000500360001000000050033000000000005003500010000000500360000000000ff66d0257d924ce2442480ee67aae726de63ca7c2b910c8ea8dcfb605deaac76fa79aa9cf069c1616fb89d702420e6abc46546477ea4ff7cf89b0952daf1db8c5ee727d7838b81bce42a8ec3d84135587cf5d97c9b363be95d8cd954512a36c75c647f1bcd6812089916060843268243e153744edbcb00938fe05fbc91397fce8b685532655dc2e92f91485f3eada1ca8d5017d59e2a856cabfe61f32b732e0c8e2667c4d0cb1cb4590d8ccdcc51069b49fcfe165a0c"], 0x64}}, 0x80) [ 350.456077][T13861] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 02:17:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x60, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@ipv4={'\x00', '\xff\xff', @remote}}, 0x0, @in=@multicast1}}, 0xe8) 02:17:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) 02:17:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:32 executing program 2: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x0, 0x0, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x8}}}}}]}}]}}, 0x0) 02:17:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) [ 350.861395][T13878] loop4: detected capacity change from 0 to 1024 [ 350.927203][T13878] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 351.194556][ T9418] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 351.444398][ T9418] usb 3-1: Using ep0 maxpacket: 8 [ 351.565118][ T9418] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 351.765167][ T9418] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 351.788757][ T9418] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 351.816765][ T9418] usb 3-1: Product: syz [ 351.833189][ T9418] usb 3-1: Manufacturer: syz [ 351.849350][ T9418] usb 3-1: SerialNumber: syz [ 351.916620][T13880] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 351.955683][ T9418] cdc_ether: probe of 3-1:1.0 failed with error -22 [ 352.262185][ T9418] usb 3-1: USB disconnect, device number 2 02:17:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, 0x0, 0x0) 02:17:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:35 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 02:17:35 executing program 3: io_setup(0x5af, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) io_submit(r0, 0x2, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:17:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:35 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) pselect6(0x40, &(0x7f0000000400), 0x0, &(0x7f0000000480)={0x8}, 0x0, 0x0) 02:17:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, 0x0, 0x0) [ 353.644056][T13912] loop4: detected capacity change from 0 to 1024 [ 353.688109][T13912] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000200)) 02:17:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000080)) 02:17:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x40000140) 02:17:35 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000011c0), 0xffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, 0x0) 02:17:35 executing program 3: mincore(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) [ 353.931566][T13928] loop4: detected capacity change from 0 to 1024 [ 353.968759][T13928] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:17:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000080)) [ 354.166009][T13940] loop4: detected capacity change from 0 to 1024 [ 354.182470][T13940] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 354.182470][T13940] 02:17:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x0) 02:17:36 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001140), 0x802, 0x0) write$UHID_INPUT(r0, &(0x7f0000001180)={0x8, {"4e32bc4aec80afef8d5454b7327d5e54efbc0e3c155933d95f1d6badf8b4be58e39e90f8657344fab0b2d3a2c2b4472ed46d89293bc7fabdd31a5962d434b3bf319cfc8874f09cf88beb2dfbf017ce66cf1ace545757305ee6c1fa198cd403edfb42585d55483632c25ba54fba9bdf560407b1bd982e7401dd125838645600b1cc99424592aee4a328eb34cd035cf7df9f8f577219acd7dc2e5a8fa7f812e1e1cd9fc850d20560a581ea95737db7236ae5eefa623c2a695aae6ac30c55d8056d88ff83490c83679be598ad603e29eb4ecee11bba330de0291553b374f2a2bc1657a41ad5489732526a32b2621cb0c9a4338f443e879ac658054025c12d339a0b81dea116dd828b88f71c632af45a98d4c8e8c94a49f0bb256fb0da53fcaf3153891a5c5ec400d3d19811787bd0fcd051d9ff3ca42e7acc78d325552ab3afe4fd1d2fde6946e2faec7dc157513e9a6a41b79525350fb6bd9bfb614474e190b94e6c5ed3e0500be5849479a6df1236affe5c3acc80de409595ed6a53f674d92580fa415045c488fe336c08584f68c97fcfffef2e78d1cb2465e18d884a3347dd3071add25e129af37131140f75751e52dcd000e23f917ff17548379bcdc47186bb0eb87035c39823f595a65caa06083527f25dbfaba9203387b020f87027233fcdc635c4a999100966043f7b51d79225d98715fc17aa065fbd7a3755050e52ae46027cbb7dc0e4aea97b5beed070e7c61e25317b272da74df478f0c979c50514cc398cb0069408c81079a2b03ccd4e38e7c4dbbc7bc02bbca1e38cfb3b930c1deb0dba44a6f5ab5871b81534d7c38e8b351afccdeeb400c2e4cc271cf813b285b97473e012b5bea54af050197bf13fe5a80b7a9ae83983e445a1ff269f94d18f929ded3231f4233a4648c10c15abbc08faee846b8c0dbe46d14ec56b2d841c89b06bfb78a2696ec3af500e88796201aead4a400129b542f8d9322c2d9b49790c4d1e295d3888c8b2b3d1ee865568a4c78bc2bf76086438990107eedfc10107ba01c135a3525a8ec35b72e4edfccc1f02df5d1ea8dd5670ec37c194e77364b974f2785066cf1c0bace0a70fabd3bd32bc9334fcdef7a8293f5c133e6844a876544e1ea87a88ab9442328c265008a3b153e3ad5447e4147432de642d16a2de89658f8bdeb10512f37d27d395ef17eb5db0517a52f8cb40bb035eb1ddd7620b5e9a0c14bb13ab704089ba012f511152ac864ea13dbe2a0271e414fbcaa4152a22936ec367d95fe90d547d571a7af79c64268592da9161acc09b0d6c9eecc0c58fb92629ccedb16f07abc393a517a9c8ee5d414691318758260abf11988269091b4f1a0b1e2152349ac68c53d90c40d2f8776988eaa93c781e5da01e24e4fb2f8d24c2cc13043b91626c0609603e488b81d6b9f1f0ad741d7ef3a5e8fa2f2144aa4f748d2f7cba7749e11e4cd10a5d92b69544f35b8ff74f0e80f41743dd704444edca4ca532a28fcb1ed5036fe96e4cde9e46acdd5424a8de1bf3528596782be37f1a1871fee0f41ddb371edf7fee340463eda587f65b0b71b0f85e299bfd699aa3b2ce35cfb8afef647eb99fad4849d17cbf3d8fe34053bd3401aacba917166778c0db52445232cb825eb6ab0671646209574a7fe2998ba5ae380952560e03b94f3022d680870c04325323a076af4e50c5d322f7baa1b131ec77eaaf9d2a5b4da7d1b526a4e746fd71fa102a1374a9eec45a95a6075ad619e0688c7a78a011618b1456ba1b9d5fb364a6622a3990b738881246389f12f9d734bacc748ec264143242b5699216e3e12e43b471739122f2589ab58e5931fd6f23144b7a6c54d69e04b46e519418bf01c151e39e9846140cd0b08ac3ae96db29cd26c3e231eb7506e0607b4f308dd7408163972dc3dd38c14f5451e1559ccb0553e4a7a8f7dc3d0b571367b75257080afd592f262ed8afad2d77e2ee4b78bd21e456be9d209b67b8178fd496f0c128fbd34dc96a4a2614223658c765a9e68ccd4ee5fbc9f29536fb85f48c08cc82cef86a416cb40bca821ba1c1430f62e331fb03810ee85dd98f36a22be13bebeda73bc0efd6e29b490f7350a6592b126cc5b4403e963c5d87c16e06f0682a9637820771140534c91defe81bc75efbc1d0444eeaff20715eb1de33e90f1aa59ac75fe31d56b1c25670d3e7f1ea3deda13fdc37db7dad710c64b8d6e18eccc3fc77ed57ba3f4c4e088c9f178d0d361ca2e075c899c8d438ce9dc38efe3ff94730d787012abc6c4cc0d15029c34e2ca61122880661c50ee7a1500cb47cc69e3200a16dd663e59a3dedeb38cd02a622e7ac6a9ae57a419e1df17b7ee14fbd4301c34fe8a69031345de4cc79bbddc06df0894346be73fe9cc8c50cbc82e95eb7981d2d5790663c002bac6af5d4dc1066d9ff51d450b0a78e1c83df434c528aa89b697276f5e9163c95b95053d7574fa2769b54c58372db89c918cc26a5a0a094a707a46f28cc904ee471bafe394fe54481a899d59b40061c8477fc0e79a459930b9f77ce38e8afe7b16aefab846c71cca10bc031b7a7ac2c88f166f7cca0d8635f46bbb5edc09ac2040aaf5851015c4a14d563a1f8162d01fc4b15c48fd19e8e763be23fa7305ae9c593fc9884b8668257df66e67936c2474b1bda2a39849ff25b3ccce5c2a8e4398f08332b8e4e6ecd7b3e2d782ae6112887321991053714bd5f1ba969902ca77e6083c8220b2cf325bc25e768530ccb3f68cd18f0642be13bf4a47441be48b9940936a9c325fa0ae916862dc9b63efc204b3e673502ea73250f5481014b8cd9d764918c9e1c41a275b798d2ac8de81bc1169766b1226f9336cba38c98939a63993198f41b8228d91ee6079431b2382f7380df743c0c22adbfd3b74ac5b6d62cf4c3c038ece45b3fa2a37eef1e2863fb1bad66ab2e42c1caf98d1011b199e23ee4af8f627afc006af55247628313e8816a0753f5ae78c25f0d2948be72bb9db1f561df696b75512717625d2dcd7d94d19ac6fc6e7a45f6c5cb3b2dc0f5b33d323935a2d51977888c2b9173cad91bde4ac4ae57a2fcffc61c0b910a3c6c717217e8af895dd5fe52f8e60d88dff896363dca0667e58e30f3ce443271a1ad06860d6cad3e31fe8ba119cc73c1a71b63a6f4232feeb0ea6242eb8567f7d6ea0cb7024c08f2ce986a5fce3f9ecb31426f3b151c1d23058bce64c5050dca9bfd223085e4872253e99b81262c53f8fb1cffd09b8f459c8dc9f7928fb31e38dbe4e25ac64bf75f23c08f97ca4829462d40aecc13c2ad14130f4433fdb63ef744729003ecc534798c50cee35672003217a347b045de6e88a5d748516556e8c1b78a4fa43766dbc2512ffe5e07e0b6c31d5ab3c2ba366c5eeee20fcee532b6da2c65b52c7c8204b6a7f3e7b7c266d6fb5e779c5f6abb2a9b9aa2ba4febeb724c28b79ab5a14fce5eaff4fd5b1131e1f5ab35839e731334c54deca69de06e22efc88628f120025e03ff69469775252399571ae4c9ce588787686b822a9475083fa769c347df842c631a3f38d01067c4947001d01de0897e2184d4d07f1d2e5b4835c26e17b976a0e54511b7c28a812af432ef0aed6fedb1a012b7147cbc1ad0c839ba65b864a4c5ee5fb3c4027ba5394b019223de7a12895f9525ab02bdd99cab4779cd87a378533ab23051e6a9b54f10a4d15bacc5025c9a2aafbf621921158ccaab3dab49777663a3270022704b5d7cf36ac27e18b8464ffe5e51ab1edb980088d330dfb67ef6a54bd23e4f7088b1a6f954c8b14829e8afe4e9b5b1b05076e7acf859db44194b8d1697a324443d32d5cf3ba01b20a9a2c40c28b75d693b799f6766d33493d5f39d30c23eceb442cc4fbc461bf98be6ffcd7d445f0b62b053e38e0b58170203fa5da1e0f30e5526e8d219c2480e0b8edccf5f190655dca1710101e173e7058f12dcf68326c9662ab73a40cbf8ace1c0dd857476048607bdf3cba23975175a1d2ce39e9e592e482fdc77e39c605adc949376d9c2f6b088e39d10360e4a262b820558f8008579415ca4ceeeb7b5e2a4c19c58c5819516ebb67feb0dc701e0904d25b084c630e68f6c1910a9ca7bd93a8e13042c9bba8fd58f843961d5c489ca0f1769108df61bf34821c64136a044a164930ab58f063c06ae80f5188958b5767ca27500b3cc0b23b0828e8bf4a89fb9b2a1f0645fe9087a2cffea5f1fe0d881fb6bf4f30b86bf3e1ffe96f91b288e6a0033e180409023006b1df8b57273977b909da6c064fc227239abb15a2b6bc2d22d9f95005c2fdefac872108ab378ea5edaec8cc35d751886bd961c368580e6fb3a5460c99d200637891a80c168bc19af3fc4dcefba0e7aac2a574be68702446fe1a4954e21c8eea3516e84e0a7e340de09f7adb5129206174c780e11062c2ab0aaa48a2cc880a2a79ca4d9905ccf6f5844a7e1697d44209816abb2da18b471cd42ed38689842ec005f3453ca0e83e07eff7c73b7f19d36350fdb85cb85b33f9b546eac8fbb8fb3f490f3693f0ebd44bcf49e463b0675aff156bf25c774361eb7d317cd24c016e62d393d4d39c99ff1162f15451864815954d8a9f254229ef890c74b695344b7a59ad620866a2afadf0d61a57eb4bf9001acb211164d7d23bbc1643f81907616ac72e92058aab406afdb1ebab52ca380731b2d9d424c2bce9893019ef9b47bbadf53005dfe830ab913bbeed78522076cd54903d9d7c6dc614800ae0d41214fc6712aff0de5563f9e04476a3f467541301e148b24874628b6eecebbd857c7bb676fa8884d79ef84ee32b9c3869b0d5292e6cc5fd7e5a58909b02f36ca1b586e034bdd8be24eeb502f0f8efa268cd6c1c78b1bddd718ef2b68607511755535ada12519d31f119415acdfc2a1ac66ac1435d10f995ee121f5f16205584d64c8d01d61667141ccecc954c76bdd839b9355a6a552474ae617b5a2d97f2a3342e0d2f457e9d8120bc718ab6807a8315bf64960aaedbc9c62bd0b6f9c44a06c5a0dbbfb97b02da72aa0a632993863d940345d823a5df578ac4c5254c0617d0f1e1415abfba01a17fd622c045094fe3092053b3af8fe5297571aac982414efd058c6b32a6c4066fc8e493973ddd89d55cda61d7139aad6b16810c1027132e6ff3fa2a4202ae6879caf3abf1314c8bb479cb53dd3ee2c3fa584fe6f6bea6c0e234f392d59c970e7df984e62a2b8f0f313b9d666e8b07534d6c9d5ee949ff0338f74ad9eb06add8a61b7bfd36b47696cbf2b67c8b3b97191e13018c03f5c89662bd82f2cb7dd6db473ee3ef0644aa6ac3ab7e10cf0b57812231be4a13a220a5915eb34d641a704879a14f59a9620d9fc9deb337d092a66c45ddd917b5847bc7654c01786fd553be126dc717b4f2b91e3e6a761836aeded6f526e9ed6c4ea6c4f31fe004a43af739a42b275ec436af077c32783966fffd44a0d6b1f00249518df6849d7bce1d4cf1ed90181148ca586b96d841757b5d71f527c490b6df53441181fe544bdcae422cb2e5b1d1770dd8fec9c2ce323183b5884cae9da0958a61667b4fc176f1c27ee893d288eb88327d943944656a503a3cd49bea674afaaa367fd3535089cd812af831a2d0874f3dc09307a04b6debdc4f60112a8e076c23a0241c486e6cf375c41bf0bd1b506f2f91f0f01382bc113843c449a197748a1948170c79325e558ce415a600f6c14b0c91c30e5ebadfb625d84dba08a405efb0b324f52d298d5a322fd86d500", 0x1000}}, 0x1006) 02:17:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/nf_conntrack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r2, 0x0, 0x0) 02:17:36 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000580), 0x0, 0x0) 02:17:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000080)) 02:17:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:17:36 executing program 3: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) [ 354.609916][T13957] loop4: detected capacity change from 0 to 1024 [ 354.649531][T13957] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 354.649531][T13957] 02:17:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'wg0\x00'}}}}}, 0x30}}, 0x0) 02:17:36 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000180), 0x4) 02:17:36 executing program 3: r0 = fsopen(&(0x7f0000000000)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 02:17:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000080)) [ 354.837308][T13971] tipc: Started in network mode [ 354.861038][T13971] tipc: Node identity , cluster identity 4711 [ 354.887662][T13971] tipc: Failed to obtain node identity [ 354.921880][T13971] tipc: Enabling of bearer rejected, failed to enable media [ 354.941569][T13975] loop4: detected capacity change from 0 to 1024 [ 354.979513][T13975] EXT4-fs (loop4): Can't support bigalloc feature without extents feature [ 354.979513][T13975] [ 354.994826][T13977] tipc: Started in network mode [ 355.005862][T13977] tipc: Node identity , cluster identity 4711 [ 355.015762][T13977] tipc: Failed to obtain node identity [ 355.021877][T13977] tipc: Enabling of bearer rejected, failed to enable media 02:17:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:37 executing program 5: io_setup(0x5af, &(0x7f0000000000)=0x0) io_setup(0xa73, &(0x7f0000000040)=0x0) io_setup(0x9, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) io_getevents(r2, 0x3f, 0x28e, &(0x7f0000000340)=[{}, {}, {}, {}], &(0x7f0000000300)={0x0, r3+60000000}) io_destroy(r0) io_destroy(r1) 02:17:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, 0x0, 0x0) 02:17:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) 02:17:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) [ 355.392018][T13995] loop4: detected capacity change from 0 to 1024 02:17:37 executing program 3: timer_settime(0x0, 0x0, &(0x7f0000001340)={{}, {0x77359400}}, &(0x7f0000001380)) 02:17:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x10100, 0x0, 0x0) 02:17:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x57, 0x0, 0x39}, 0x0) 02:17:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) 02:17:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) 02:17:37 executing program 3: sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xffffff7f) [ 355.707291][T14015] loop4: detected capacity change from 0 to 1024 02:17:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:37 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) 02:17:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006300000019037500600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000020000001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) 02:17:37 executing program 3: futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x0, 0xea60}, {0x77359400}}) 02:17:37 executing program 2: io_setup(0x5af, &(0x7f0000000000)=0x0) io_setup(0x5109, &(0x7f0000000040)) io_destroy(r0) io_setup(0x9, &(0x7f0000000140)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 02:17:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000040)=""/27, &(0x7f0000000080)=0x1b) [ 356.122127][T14030] loop4: detected capacity change from 0 to 1024 02:17:38 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000100)={0x0, {'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/70, 0x46}}, 0x120) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000240), 0xc) 02:17:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:38 executing program 5: getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) [ 356.376639][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.399742][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 02:17:38 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x4}, 0x0) 02:17:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback={0x4000000000000000}}, 0x1c) [ 356.440908][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.475862][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 02:17:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000006a40)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r0, &(0x7f00000043c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="87", 0x1}], 0x1}}], 0x1, 0x0) [ 356.508092][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.550419][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.600456][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.634453][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.664472][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.690453][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.703686][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.733914][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.741979][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.758190][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.770373][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.783464][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.792149][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.802876][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.818461][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.835317][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.847180][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.855319][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.863050][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.871014][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.879417][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.888422][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.897337][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.912933][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.924165][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.944244][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.951668][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.974110][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 356.981533][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.004040][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.011471][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.020981][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.044056][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.051480][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.074038][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.081468][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.108220][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.124045][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.131478][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.154032][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.161639][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.170896][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.194038][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.201496][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.234037][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.242669][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.242700][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.242725][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.242754][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.304042][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.311525][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.324046][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.331609][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.348559][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.364042][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.380789][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.388761][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.421005][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.446932][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.470195][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.495420][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.519751][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.550820][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.582076][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.622768][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.654999][ T5] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 357.718312][ T5] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 02:17:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x8, 0x0, 0x4, 0x6e431613}, 0x40) 02:17:41 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000003c0)) 02:17:41 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8906, 0x0) 02:17:41 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) getdents(r0, 0x0, 0x0) 02:17:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x54) 02:17:41 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[], 0x89) recvmsg$unix(r0, &(0x7f00000005c0)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)=""/156, 0x9c}], 0x1}, 0x0) 02:17:41 executing program 4: setreuid(0xffffffffffffffff, 0xee00) fsopen(0x0, 0x0) 02:17:41 executing program 1: syz_open_dev$vcsu(&(0x7f00000061c0), 0x0, 0x0) 02:17:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:41 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 02:17:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x80108906, 0x0) 02:17:41 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:17:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a80), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000b00)={0x0}}, 0x0) 02:17:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003c00)={&(0x7f0000002900)=@abs={0x1}, 0x6e, &(0x7f0000003bc0)=[{&(0x7f0000002980)="ff", 0x1}, {&(0x7f0000003980)="85", 0x1}], 0x2}, 0x0) 02:17:41 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 02:17:42 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000011c0), 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, 0x0) 02:17:42 executing program 1: syz_mount_image$tmpfs(&(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 02:17:42 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 02:17:42 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f00000070c0), &(0x7f0000007100), 0x0) 02:17:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:42 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x17, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}]}, 0x20}}, 0x0) 02:17:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000140)={@local}, 0x14) 02:17:42 executing program 4: recvmsg$unix(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000028c0)) 02:17:42 executing program 3: accept4$tipc(0xffffffffffffffff, 0x0, 0x0, 0x180000) 02:17:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0900000000000000df25010000000000000008410000004c001880000000657468"], 0x68}}, 0x0) 02:17:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000200)={'sit0\x00', 0x0}) 02:17:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x12110) 02:17:42 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:42 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000500)={&(0x7f0000000000), 0x10, 0x0}, 0x20000840) 02:17:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x36, &(0x7f0000000280)={{{@in6=@private1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xe8) 02:17:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x4000000000000000}, 0x0) 02:17:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(0xffffffffffffffff, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a80), r0) syz_genetlink_get_family_id$nbd(&(0x7f0000000b80), r0) 02:17:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 02:17:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000900)={&(0x7f0000000840), 0x7, &(0x7f00000008c0)={0x0}}, 0x0) 02:17:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000028c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x2123, 0x0) 02:17:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 02:17:43 executing program 4: socketpair(0x1e, 0x0, 0x1ff, &(0x7f0000000000)) 02:17:43 executing program 2: r0 = getpgid(0x0) fork() wait4(r0, 0x0, 0x0, 0x0) 02:17:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000bb40)={0x17, 0x0, 0x2, 0x400, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x40) 02:17:43 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x3, 0x0, 0x0) 02:17:43 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000080)={@local, @dev, @void, {@mpls_uc={0x8847, {[], @ipv6=@tipc_packet={0x0, 0x6, "670905", 0x28, 0x6, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}, 0x0) 02:17:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYRES32], 0x30}, 0x0) 02:17:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(0xffffffffffffffff, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:45 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, 0x0, 0x0) 02:17:45 executing program 5: syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x246002) pselect6(0x4, &(0x7f0000000400), 0x0, &(0x7f0000000480)={0x8}, 0x0, 0x0) 02:17:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 02:17:45 executing program 4: pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 02:17:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_flags}) 02:17:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000580)={'ip6tnl0\x00', 0x0}) 02:17:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x10000000) 02:17:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, 0x0) 02:17:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'wg1\x00', @ifru_flags}) 02:17:45 executing program 2: socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)) 02:17:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:17:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(0xffffffffffffffff, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:47 executing program 5: semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0xffff}], 0x1, &(0x7f0000001f40)) 02:17:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) 02:17:47 executing program 1: prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffd000/0x2000)=nil) 02:17:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x3, 0x0, 0x0, 0x1ff}]}) 02:17:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000001c0)={0xfffffffffffffffd, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 02:17:47 executing program 2: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) 02:17:47 executing program 3: semtimedop(0x0, &(0x7f0000001040)=[{0x2}], 0x1, &(0x7f0000001080)={0x0, 0x3938700}) 02:17:47 executing program 1: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xdfea868fab6b5da6) shmat(0x0, &(0x7f0000800000/0x1000)=nil, 0x4000) 02:17:47 executing program 5: get_robust_list(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={0x0}, 0x1, 0x0, 0x0, 0xeda10f3f04f0b48}, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000280)="92", 0x1, 0x7fffffff}, {&(0x7f0000000380)="a577f01e2f2b0f1b7f2f64223429aeaf15db790689d8eaad7511a5bdeab3643bf4e2a07314d5aabef4cf5afa61e448f3436bd618e6b21c64e81fee416e", 0x3d, 0xfc4}, {0x0}]) 02:17:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}], 0x1, 0x0) 02:17:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) [ 366.093097][T14271] loop5: detected capacity change from 0 to 264192 02:17:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 02:17:49 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x90081, 0x0) 02:17:49 executing program 3: process_vm_writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000180)=""/159, 0x9f}], 0x1, &(0x7f0000001740)=[{&(0x7f0000000440)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 02:17:49 executing program 4: fork() prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/169) 02:17:49 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x430080, 0x0) 02:17:49 executing program 5: io_setup(0x8000, &(0x7f0000000040)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x77359400}) 02:17:49 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000005a40)={0x77359400}) getresgid(&(0x7f0000005a80), &(0x7f0000005ac0), &(0x7f0000005b00)) 02:17:49 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000015c0)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}], 0x38}}], 0x1, 0x0) 02:17:49 executing program 3: prlimit64(0x0, 0xa3f4c3e3178ee999, 0x0, 0x0) 02:17:49 executing program 4: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000ff9000/0x7000)=nil, 0x7000) 02:17:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:49 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x246200, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) 02:17:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000001e40)=@abs, &(0x7f00000005c0)=0x6e) 02:17:49 executing program 2: syz_open_dev$rtc(0xffffffffffffffff, 0x0, 0x0) 02:17:49 executing program 5: r0 = fork() process_vm_writev(r0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/186, 0xba}], 0x1, &(0x7f00000027c0)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, 0x0) 02:17:49 executing program 4: r0 = fork() ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 02:17:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001b40)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x10}}], 0x28}, 0x0) 02:17:49 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x101, 0x0) 02:17:49 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000c86000/0x1000)=nil) shmat(0x0, &(0x7f0000c84000/0x3000)=nil, 0x5000) shmat(r0, &(0x7f0000c85000/0x2000)=nil, 0x5000) 02:17:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:50 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x7ff]}, 0x0, 0x8) 02:17:50 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0xee00, 0x0, 0xee00}}) 02:17:50 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) 02:17:50 executing program 2: prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000c00000/0x400000)=nil) 02:17:50 executing program 1: memfd_create(&(0x7f000000aa00)='][\x00', 0x2) 02:17:50 executing program 3: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xd) 02:17:50 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xdfea868fab6b5da6) shmat(0x0, &(0x7f0000800000/0x1000)=nil, 0x4000) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 02:17:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@abs, 0x6e) 02:17:50 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000c79000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@dstype0], 0x1) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/240) 02:17:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000440)) 02:17:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[], 0x8c}}, 0x0) 02:17:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:50 executing program 2: prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/37) 02:17:50 executing program 4: io_setup(0x11f, &(0x7f0000000140)=0x0) io_cancel(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:17:50 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000001440)='ns/ipc\x00') 02:17:50 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000c86000/0x1000)=nil) shmat(r0, &(0x7f0000c84000/0x3000)=nil, 0x5000) shmat(0x0, &(0x7f0000c84000/0x3000)=nil, 0x5000) 02:17:50 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) 02:17:50 executing program 2: prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000d98000/0x2000)=nil) 02:17:50 executing program 4: syz_open_dev$loop(&(0x7f0000000140), 0x9, 0x0) 02:17:50 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) 02:17:51 executing program 1: ustat(0x8, &(0x7f0000000100)) 02:17:51 executing program 3: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000003dc0)={{0x3}}) 02:17:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f00000002c0)) 02:17:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:17:51 executing program 5: shmat(0x0, &(0x7f0000c84000/0x3000)=nil, 0x5000) shmat(0x0, &(0x7f0000c85000/0x2000)=nil, 0x5000) 02:17:51 executing program 3: semtimedop(0x0, &(0x7f0000001040)=[{0x0, 0x8}], 0x1, &(0x7f0000001080)={0x0, 0x3938700}) 02:17:51 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000180)=""/253, 0xfd}], 0x2, &(0x7f00000027c0)=[{&(0x7f00000014c0)=""/29, 0x1d}], 0x1, 0x0) 02:17:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)="04", 0x1, 0x0, 0x0, 0x0) 02:17:51 executing program 5: modify_ldt$read_default(0x2, &(0x7f0000000080)=""/6, 0x6) 02:17:51 executing program 3: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xdfea868fab6b5da6) shmget(0x3, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) 02:17:51 executing program 4: syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001100)) 02:17:51 executing program 2: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r0) 02:17:51 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) getcwd(&(0x7f0000000040)=""/65, 0x41) 02:17:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x8c}}, 0x0) 02:17:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000094c0)=[{{0x0, 0x0, &(0x7f00000050c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x40000041, 0x0) 02:17:52 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 02:17:52 executing program 3: mlock2(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/160) 02:17:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 02:17:52 executing program 5: ioperm(0x0, 0xfa, 0x4) 02:17:52 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), 0xffffffffffffffff) 02:17:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000580)={&(0x7f00000009c0), 0xfffffffffffffc88, &(0x7f0000000a80)={0x0}}, 0x0) 02:17:52 executing program 2: capget(&(0x7f0000000040), &(0x7f00000000c0)) 02:17:52 executing program 1: semtimedop(0x0, &(0x7f0000001040)=[{0x2}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000001080)={0x0, 0x3938700}) 02:17:52 executing program 3: syslog(0x4, &(0x7f0000000040)=""/171, 0xab) 02:17:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xe200, 0x0) 02:17:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:53 executing program 2: r0 = fork() process_vm_writev(r0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/186, 0xba}, {&(0x7f0000000180)=""/253, 0xfd}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/199, 0xc7}], 0x4, &(0x7f00000027c0)=[{&(0x7f00000014c0)=""/29, 0x1d}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x2, 0x0) 02:17:53 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x14400, 0x0) 02:17:53 executing program 1: semtimedop(0x0, &(0x7f0000001040)=[{0x0, 0x8}], 0x1, 0x0) 02:17:53 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) 02:17:53 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x3f}, &(0x7f0000000100)={0x0, r0/1000+60000}) 02:17:53 executing program 1: r0 = fork() sched_setparam(r0, &(0x7f0000000040)) 02:17:53 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, 0x0) 02:17:53 executing program 4: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) 02:17:53 executing program 5: syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x200001) 02:17:53 executing program 2: shmat(0x0, &(0x7f0000800000/0x1000)=nil, 0x4000) 02:17:53 executing program 5: rt_sigprocmask(0x1, &(0x7f0000001940), 0x0, 0x8) 02:17:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:55 executing program 4: rt_sigprocmask(0x2, &(0x7f0000000040), &(0x7f00000000c0), 0x8) 02:17:55 executing program 3: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xdfea868fab6b5da6) mincore(&(0x7f0000dfd000/0x3000)=nil, 0x3000, 0x0) 02:17:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 02:17:55 executing program 1: sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0xf2bdf3b58838cdaa) 02:17:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 02:17:55 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getcwd(&(0x7f0000000040)=""/65, 0x41) 02:17:55 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x10800, 0x0) 02:17:55 executing program 4: r0 = fork() sched_setaffinity(r0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) 02:17:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x60402) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 02:17:55 executing program 2: syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x82) 02:17:55 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x40102, 0x0) 02:17:56 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000040), 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080), 0x0) 02:17:56 executing program 5: r0 = fork() process_vm_writev(r0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/186, 0xba}, {&(0x7f0000000180)=""/253, 0xfd}], 0x2, &(0x7f00000027c0)=[{&(0x7f00000014c0)=""/29, 0x1d}, {&(0x7f0000001500)=""/4096, 0x1000}, {0x0}], 0x3, 0x0) 02:17:56 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001500)=[{0x0}, {0x0}], 0x2, &(0x7f00000015c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}], 0x38}}], 0x1, 0x0) 02:17:56 executing program 2: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0xbb3}, &(0x7f0000000200)={0x77359400}, 0x0) 02:17:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000740)={&(0x7f00000005c0), 0xc, &(0x7f0000000700)={0x0}}, 0x0) 02:17:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x7fffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000240)) 02:17:56 executing program 3: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000000)) times(&(0x7f0000000080)) 02:17:56 executing program 1: remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x0, 0x0) 02:17:56 executing program 2: clone(0xe0200, 0x0, 0x0, 0x0, 0x0) 02:17:57 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}], 0x20}}], 0x1, 0x0) [ 375.098160][T14604] mmap: syz-executor.1 (14604) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:17:57 executing program 3: setfsuid(0xee00) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:17:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000740)={&(0x7f00000005c0), 0xc, 0x0}, 0x0) 02:17:57 executing program 1: mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/97) modify_ldt$read_default(0x2, 0x0, 0x0) 02:17:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x5c, &(0x7f00000001c0)="433900009919da078a0098d16ee0a593b040f7629100f06ee04fa447a3ba82583a96ea57ff22ea97be19af3deba014190400000000000000000073123304d422a0dd08e8de00218275b3054a3b656f80adcb67cc70ce1190dba4e120"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 02:17:57 executing program 5: prctl$PR_SET_MM(0x23, 0xc, &(0x7f0000c00000/0x400000)=nil) 02:17:58 executing program 1: prlimit64(0x0, 0xd, &(0x7f0000000000)={0x0, 0x6689}, 0x0) 02:17:58 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001500)=[{0x0}, {0x0}], 0x2, &(0x7f00000015c0)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}], 0x38}}], 0x1, 0x0) 02:17:58 executing program 2: sigaltstack(&(0x7f0000c84000/0x3000)=nil, 0x0) 02:17:58 executing program 4: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 02:17:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:58 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, 0x0, 0xfd29) 02:17:58 executing program 5: r0 = fork() process_vm_writev(r0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/186, 0xba}], 0x1, &(0x7f00000027c0)=[{&(0x7f00000014c0)=""/29, 0x1d}], 0x1, 0x0) 02:17:58 executing program 1: syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x4000) 02:17:58 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000006080)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001500)=[{0x0}, {0x0}], 0x2, &(0x7f00000015c0)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}], 0x38}}], 0x1, 0x0) 02:17:58 executing program 2: sigaltstack(&(0x7f0000c84000/0x3000)=nil, 0x0) mlock2(&(0x7f0000c84000/0x4000)=nil, 0x4000, 0x0) 02:17:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f6"], 0x48}}, 0x0) 02:17:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:17:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 02:17:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 02:17:58 executing program 3: r0 = socket(0x2, 0x3, 0x4) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 02:17:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2, 0x9}, 0x1c, 0x0}, 0x0) 02:17:59 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:17:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "2780857b12d15495d8d737a2ed925fb88e885b"}) 02:17:59 executing program 5: inotify_add_watch(0xffffffffffffffff, 0x0, 0xe0800080) 02:17:59 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0xee01) 02:17:59 executing program 2: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 02:17:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000040)=0xfffffffffffffdf6) 02:17:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, 0x0}, 0x0) 02:17:59 executing program 2: memfd_create(&(0x7f0000000080)='!\x00', 0x2) 02:17:59 executing program 5: r0 = socket(0x2, 0x3, 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, 0x0) 02:17:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080)=0x1, 0x4) 02:17:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe63}}], 0x1, 0x0) 02:18:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000010c0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001080)={&(0x7f0000000c80)={0x14}, 0x14}}, 0x0) [ 378.215328][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.221804][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 02:18:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5}, 0x40) 02:18:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) 02:18:00 executing program 4: r0 = getpgrp(0x0) ptrace$pokeuser(0x6, r0, 0x0, 0x0) 02:18:00 executing program 5: r0 = socket(0x2, 0x3, 0x4) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000), 0x4) 02:18:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80000001}, 0x1c) 02:18:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x202000) 02:18:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f000000bb40)={0x17, 0x0, 0x2, 0x400, 0x0, 0x1}, 0x40) 02:18:01 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f00000021c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0xfffffe25, 0x0}}], 0x1, 0x0) 02:18:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="83a564e5c71e22fdd8") 02:18:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 02:18:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) 02:18:02 executing program 4: getpgid(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 02:18:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x2) 02:18:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000040)=0x5b) 02:18:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast, 0x0, 0x2, 'rr\x00'}, 0x2c) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8b05, 0x0) 02:18:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x24b}, 0x40) [ 380.390402][T14783] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 02:18:02 executing program 1: inotify_init1(0x100800) 02:18:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x160, 0x0, 0x0) 02:18:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x2000002, 0x0, 0x0, 0x0, 0x0, "63c6dd01b6d8fb6612152972aac6751742c5ff"}) 02:18:02 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4) 02:18:02 executing program 3: sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$nl802154(0x0, r0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x852804}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4810}, 0x4000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 381.256905][T14811] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 02:18:03 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000480)={0x7, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 02:18:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x18, 0x0, 0x0) 02:18:03 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind$alg(r0, 0x0, 0x0) 02:18:03 executing program 3: r0 = epoll_create(0x100) r1 = epoll_create(0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 02:18:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}, 0x20008014) 02:18:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 02:18:03 executing program 4: socket$alg(0x26, 0x5, 0x0) pselect6(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x6}, 0x0, 0x0, 0x0) 02:18:03 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 02:18:03 executing program 1: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @l2tp={0x2, 0x0, @private}, @tipc=@id, @nfc={0x27, 0x20000}}) 02:18:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x40) 02:18:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000500)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@hopopts={{0x18}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3ff}}], 0x30}}], 0x1, 0x0) 02:18:05 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:05 executing program 5: epoll_create1(0x0) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x1}, &(0x7f0000000300)={0x9}, 0x0, 0x0) 02:18:05 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 02:18:05 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100), 0x400000000000330, 0x0, 0x0) 02:18:05 executing program 4: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0xffff) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x90000010}) 02:18:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x4, 0x0, 0xab}, 0x40) 02:18:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f00000000c0)) 02:18:05 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) [ 383.371638][T14871] "syz-executor.3" (14871) uses obsolete ecb(arc4) skcipher 02:18:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6}, 0x40) 02:18:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) 02:18:05 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100), 0x400000000000330, 0x0, 0x0) 02:18:05 executing program 4: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 383.733485][T14891] "syz-executor.3" (14891) uses obsolete ecb(arc4) skcipher 02:18:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:07 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x2000021) 02:18:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x40, 0x0, 0x0) 02:18:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100), 0x400000000000330, 0x0, 0x0) 02:18:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080), 0x4) 02:18:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) 02:18:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000080)=0x3ff, 0x4) [ 385.177739][T14918] "syz-executor.3" (14918) uses obsolete ecb(arc4) skcipher 02:18:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x84}, 0x40) 02:18:07 executing program 1: socketpair(0x0, 0xc0a, 0x0, 0x0) 02:18:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) 02:18:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100), 0x400000000000330, 0x0, 0x0) 02:18:07 executing program 1: socket(0x11, 0x3, 0x0) socket(0x11, 0x2, 0x0) [ 385.519916][T14936] "syz-executor.3" (14936) uses obsolete ecb(arc4) skcipher 02:18:08 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/diskstats\x00', 0x0, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/126, 0x7e}], 0x1, 0x0, 0x8) r1 = timerfd_create(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000200)={0x1, 0x605}) fremovexattr(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="770fecba572212b2500ccf81c694c444f794ceab042db68b18978881839fe69b03e85e7b3720589d6e65e44c10cca91d0c7348573798ee4f7ec9bf2b31f3efaf8ee6181e0ae0a5e164e3ce79f2abd0a20cee6bb4f3c2190ac9aca34cb78475d34ccb5e62ff9a3509dc5984dafebbe34ec51ee2901426ad57c3c75a4321881df10d92afe18a85a74e409ce51a58aa6476d5bfa6106724593013eafc2d87"]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x1a3, 0x0, 0x0) 02:18:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 02:18:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) 02:18:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000500)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) 02:18:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:08 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000021c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) [ 386.910943][T14964] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:18:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes-generic)\x00'}, 0x58) 02:18:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="83a564") 02:18:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) 02:18:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) accept(r0, &(0x7f0000000200)=@l2={0x1f, 0x0, @none}, 0x0) 02:18:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 02:18:09 executing program 4: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 02:18:09 executing program 3: sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000004"], 0x20}}, 0x0) 02:18:09 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f0000000400)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="7a7bd5d4d4e4e7805f437ae6b09d12a3aea6a88156cda6b0dd31ac614bc447"}], 0x0, &(0x7f0000000240)=[@dontfrag, @hopopts={{0x0, 0x29, 0x36, {0x0, 0x0, '\x00', [@calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @ra, @pad1]}}}, @rthdr_2292={{0x0, 0x29, 0x39, {0x0, 0x0, 0x0, 0x0, 0x0, [@loopback, @mcast2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @remote, @private1, @loopback]}}}, @hoplimit_2292]}}], 0x1, 0x0) 02:18:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000000), 0x4) 02:18:09 executing program 4: r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000040)) [ 387.550481][T14994] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:18:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3}, 0x20) 02:18:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x0, 0xd}, &(0x7f0000000040)=0x20) 02:18:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180), 0x12) 02:18:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0xffff0001, 0x0, 0x0, 0x0, 0x0, "b0481248660898bb0758000de4f682a67a09ca"}) 02:18:10 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000140)=ANY=[], 0x48, 0xfffffffffffffffe) 02:18:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x40) 02:18:10 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) 02:18:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc-aes-ce\x00'}, 0xfffffffffffffd2e) 02:18:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)='D', 0x1) 02:18:11 executing program 5: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}) 02:18:12 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x51) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000580)={&(0x7f0000000040), 0xc, &(0x7f0000000540)={0x0}}, 0x0) 02:18:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x40) 02:18:12 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:18:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 02:18:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 02:18:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xa86, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "8dfa95f490b5c29ff9389f224c1d0f8d82b5401c68b18752f1f24810951641b2d28aa470a5fec7cc1cabfbdc679b6581b170cb2963e4d4421cf7cf61bf2e91106a5ccf86ced704dd5a91ce8fb6fa3bd4f0264986d9029c368058c1e293fdeab2ecadd3a1ccd738982be05e6527994f4d77691586962fb2ae58e80d061dbba03c9a595ffd4fb2788cd2a8e6147bf811fed93b0583e9ccd11df48aff0b5e0fc187392aa58728bbb313b8de8064e11cf658d4bb435e975574075faaae14529f47d687b1178c084e23c07574ca6d52155b5710231f80b96d6e3f99a05008ff65fc5a88242e8c12cf627442215a5eac9c07457af4980fb3cff8e999c94b6a95bb86457a9d71f139c054c26c88591fefa00524a080ffea5e29a99539b2beacc330b9c4c787e8adb5cf3e1dc30e877e2df587d44e9f2b204a99d914651fb183f816760ae3075916630905f52ddea2dad60a27da4650af5d05443215f78a826fd0599d12a4d9fabe4a3778ea20893b1afa01b78753cd758899b74aaad16b3f573eb2f39153b8c5cd0cbcd06274a462773e3f52bafe685084f9e482a3258cd3aedb1504cc0dcd567917600e564ff2d2fe8fb4afcd235db6db4fcda2b8f53798039f73dbd10b8c2f99697743a5b78a141f18a831aa794dd9430e2ab8b596e3d78e59d6763a86b0885e8f627002a5d77eac470fb685a4f7814b130fa4a7e5e66b3e6e3fae7bf31321c9f8858d8996c56391e41ed62fa28b4db74582f7578bc22266a64476654a23aa3878cc4e4b1c2d961f6e223498e0937572c7db8e6265063101cab017a65a7c77a503fec556060f8102caa95c5a23eebcdd3d1897f05f1328acae7446b5d5db454013c7e42c4d96accf8ddfe71fc7e5f56370d18a69dc699ad1303cb38a11f83d1a8660846755cd47a7f3a433a4011ee128b1e1ffec5a440621a6d044bd17ceee1f5cfec1dd35f41b89a816eaf5f25754307cb3968eae10d566fb79679c7af6ff82b28766cd99539dc09cefc0523a2112c5c81b269c8ec59131dbb9e5cb04d94b28f586b68b5d7df852866ad550768b34712a6080648ca5e3ddbb0996f0b0497ea907c6225d86664a4d5a659782373672b91e6c8ded3445dab6302bf55de0ba17560668426dcc562f757b019c878969a364a5e60be8eb6c3595846b7cbdbd0e1f88422a50d083bf65dd9dd2f5919bf38c2a74fce75f20517a17be51efd6f794e0f59e91da0478b833184db399e635d5c6a469bd5d1dde0c426fff46a4aea7af93ab32afef4d7864e7c7c6b81001293d1888b45f75e98707513fbd69ae16ac5b344532b7d62dcbfc1edc2bceab8a0ec62bf4638f13b968b764ece346288fceec159e68f49db618ea2ad067b301bb69ef7f983afd323738d9abdc729080130b00ee1e82997e9a41f03dd0712d73e334555e440d782adc17302bd3688b37e21dcc044cd139b7cf575ea372916ad6b94e6624cd77a97f18941e69eac13636a30e66cfdb31621145784864f25e61d66eabbafd2580bf1dd950a3e4884bf23c223711c833c715e8b1bf6a187da53bf021b53e5a3297e6d235b6effdd41c4b4de8a5bdbc84b002857e2483e35f3594809261454b257896e966c69b1fd95cc319e309e00e3f70b708794b742bb19234df85411c225b86c0115454a965b278dd5f6a7ea0e21c8679b57bf9090a1ce919c4d1056839725dcaa73640f3a9cc517284806653063fbb48bb614f1587f1cccb65f074c4508670f25e7a1fb3bb5b0c1a3d13b3a70a05f9be65880580809e80a5358132ed29a0ff8286d8de4812e4a0b5eb8bb12374ba43cf555fd033b9d4e95280293971fc81ff68c866df2cc49fecf90651b04de9d755dd77186b31de06d9828971c4202b98f757ffa00b0a7a3fab432dda48f6e3f2ac364a7a5749f56bf32142b2ad6c82f394477a7556a247d4863b2ba06b33e862f9ba43599c013d5739b3ce841e1776dbf03ef0b9c3fe3a138b2af1604c789b528dba03b5bdf6109adaf94aa24dad44b3257ca0f4e6800aaf1c0ef19c9461a56486d6909514b98603846d6ffb5d0acb57186dd9d6cd7420c86dd9f0bb66e55dd70438cf20ee740cf780ea58b9562df870fc18659a6d9185873870790c9f087082365f40d7de077b81131d1b6651cc2fbe656fa7ed8f56c03d082fbce1dc67325c57d5af51d5fd243eb34b3ff952dd17d84a5688be17341f9d1a12e14f164f1065769d1ee1500afd2b52eeb470412fe623d58815b0f1170d519659959471b23fae3175f1409148daeb6d1f27622fa63bf06ad61362aa831c5ef62a03607eb2b8542c4b17d1d3f915d93f5df579068f015f0c78d2d87805ebfe8e6f57ddeaeef2a73e0283680227f1987561999d1a4a9e1b11ab945458a17f5c8d161b82b416e00bc90d2d5f5efffeafea0c30a6dbef943d4a580c4785118da34fd15514b81a8e7b5a9eebfe59b0d3565ded6c5200b20bd56eed9f95bb0e4d68bb99ce629a646c69270492b00e984317bb17f6bb29c264f64347b4948044b9f35f72889a0733e9b5381beaa1f69a72aa57cc00c24916d98f26fe0cf0457ec975b037cca64d581dd32005b7d7d39f26eb688002561366d68057d4183e940b6509468f0268174b35e0e13a101a3071b58df7cbdbc7819b523e30b74ed088a32c7ba159abd986a4607ebfc036e396645705b076543dd27b33b7bcf5b2f7fe989902d346aea6c7ef67573c83903e09570bc48017e01bfe1686e9fe3da28e727d679ddca33ce193fd3c4a525c25eb9d4e0d727dd0c9c9ee3709755344828402a6d384ea16ad9bdac4518df78eb1a848c269c7571d56742c2ff67fba4a57aefc93c45f814e4eb8cb9c04989072a25c8ccca82862053c1c0fde1891e5c8f8783118485f25adb48a1dce26eacdd4ddc84d07473d61cf6ee6a4d28b022311f1b7151763e083488866a8a7edddc8f61ffb6451764a6008f022d346c819ec86a0256958265e5ce28da25f84e90cdf97abf746108d782661f5533547099a4f8928a071f0afbebcb4acb82eb3f8aa14df0823ceade1dfc7e052fdb79d7dabd5477f4d18b602721892c56a8de2e0a955dbd60201fbc4ebf088b6efd6ad133cdf5134825517a8a21e16ab52ce3dc4b75ff07e33d74d68d5bd04056c88cfeea72065bed06eb9ac039d8130477ca68b36c06a15567e178012e2e090b42bdc235e05ca662aae33c1f736aefb41621ed734813db359d6ee2c3ac01aec680369b7164325c6fbfe0b28363f7d88f132f0eae29f132757772fc7336c5554907ab10b7143da1b62d9dbaa960fb7e32700334ee6a00f0f4b68e86dc0cdf09a8919b37d5cca678cdb09b1ba31e32e6a8a873faff01e7e37aebdac6fe276539eb764c37b2c54942b2c3bff04ecebaffbfd871efd41b6392a1e3be49a078abd76f6ce08431ea920d04ea2972291169487a056d4719eb08c1f52ed3ea26af31ae9d9d16463387e6e1a6b0d66040a7af2f0ce3a0b8df477f06c64f30ba59f6dfade2cee217cf56fadc107d603c80a2e68dd8b11e84dad6857495435c6bf5d7af2bf02c3b05e472b736114ef171a5358908657a4923460e295097081baf8410e17c9fa58e908d67124cc25d73e8c09ddfdfc7f663fb40a72691164490b7ea506084777283b653d2622972afe4ab4b24919f12f54cb3e03fff483632543a202b4662b1056f6b20830f8bd0cdf2c48ee0f1ca966251d4c0ece6dc318a7b2da1c37204b7a699fd195b817f669c7060c958f2bddbb868aae4801325c7933833d65bc5a95a0cf"}, 0xa86, 0x0) 02:18:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[], 0x8) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) 02:18:12 executing program 4: r0 = socket(0x2, 0x3, 0x4) sendmmsg$alg(r0, &(0x7f0000003000)=[{0x0, 0x0, &(0x7f0000000800)=[{0xfffffffffffffffc, 0xffffffffffffff7c}], 0xfffff09}], 0x1, 0x0) 02:18:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080), 0x4) 02:18:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(aes))\x00'}, 0x58) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) 02:18:12 executing program 1: select(0x2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) 02:18:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 02:18:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xa}, 0x40) 02:18:14 executing program 4: getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0x938, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0x938, 0x0) 02:18:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) 02:18:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvfrom$inet6(r0, 0x0, 0x0, 0x2100, 0x0, 0x0) 02:18:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0xa86}, 0x40) 02:18:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) wait4(0xffffffffffffffff, &(0x7f00000000c0), 0x80000000, 0x0) 02:18:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan4\x00'}) 02:18:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) recvfrom$inet6(r0, 0x0, 0x0, 0x10060, 0x0, 0x0) 02:18:14 executing program 1: r0 = socket(0x2, 0x3, 0x4) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000003040)=[@hopopts={{0x58, 0x29, 0x36, {0x0, 0x7, '\x00', [@calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @jumbo, @jumbo, @enc_lim, @hao={0xc9, 0x10, @private2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private0}}}, @dontfrag={{0x14}}, @hopopts={{0x1f70, 0x29, 0x36, {0x0, 0x3ea, '\x00', [@generic={0x0, 0x1000, "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"}, @pad1, @hao={0xc9, 0x10, @mcast2}, @enc_lim, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @generic={0x0, 0xf1d, "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"}]}}}], 0x2008}}], 0x1, 0x0) 02:18:14 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x30000010}) [ 392.759618][T15141] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! [ 392.899910][ T37] audit: type=1400 audit(1628043494.769:34): avc: denied { block_suspend } for pid=15142 comm="syz-executor.3" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 02:18:16 executing program 0: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:16 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) 02:18:16 executing program 4: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 02:18:16 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f00000002c0)='cubic\x00', 0x6) 02:18:16 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 02:18:16 executing program 3: r0 = socket(0x2, 0x3, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(rfc4309(rfc4106(gcm(aes))))\x00'}, 0x58) 02:18:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(camellia)\x00'}, 0x58) 02:18:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000080), 0x8) 02:18:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)) 02:18:16 executing program 4: sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) 02:18:16 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) 02:18:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002f40)=[{{&(0x7f0000002b00)={0xa, 0x4e20, 0x0, @local, 0xffffffff}, 0x1c, 0x0}}], 0x1, 0x0) 02:18:17 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b65, 0x0) 02:18:17 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) 02:18:17 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 02:18:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile]}, {0x0, [0x0, 0x0]}}, &(0x7f00000004c0)=""/4096, 0x1000000, 0x1000, 0x1}, 0x20) 02:18:17 executing program 1: r0 = epoll_create(0x100) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x60000005}) 02:18:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2, 0x9}, 0x1c, 0x0}, 0x0) 02:18:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:17 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) 02:18:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x1, 0x101, 0x6, 0x0, 0x1}, 0x40) 02:18:18 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffff9) 02:18:18 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x158}}], 0x1, 0x405d840) 02:18:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 02:18:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "2df62386204d377c502415c342d4c3ba900324"}) 02:18:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x0, 0x1f, 0x0, 0x1}, 0x40) 02:18:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cipher_null)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 02:18:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}, 0x0) 02:18:18 executing program 5: r0 = epoll_create(0x100) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 02:18:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)) 02:18:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4c, 0x0, &(0x7f0000000000)) 02:18:19 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 02:18:21 executing program 4: r0 = socket(0x11, 0x2, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x78) 02:18:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, 0x0}, 0x0) 02:18:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080), 0x4) 02:18:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000009380)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@flowinfo={{0x14, 0x29, 0xb, 0x9}}, @flowinfo={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev}}}}], 0x58}}], 0x1, 0x0) 02:18:21 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 02:18:21 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="02010500000001000000ff0700000000000055000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 02:18:21 executing program 4: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) 02:18:21 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(r1, r2) 02:18:21 executing program 2: pipe(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000040000000400000000000040"], 0x20}}, 0x0) 02:18:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-aes-aesni\x00'}, 0x58) 02:18:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, 0x1c, 0x0}, 0x24008001) [ 399.581730][T15331] loop5: detected capacity change from 0 to 1 [ 399.643841][T15337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 399.664983][T15331] loop5: p1 < > p2[EZD] p3 < p5 p6 > p4 [ 399.672113][T15331] loop5: partition table partially beyond EOD, truncated 02:18:21 executing program 3: getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x49000, 0x9, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) setgroups(0x3, &(0x7f00000011c0)=[0x0, 0xee00, 0xffffffffffffffff]) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xa86, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xa86, 0x0) [ 399.719310][T15331] loop5: p1 start 1 is beyond EOD, truncated [ 399.754072][T15331] loop5: p2 size 1073741824 extends beyond EOD, truncated 02:18:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2c, 0x1, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @loopback}}}]}]}, 0x2c}}, 0x0) 02:18:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2c, 0x0, 0x9, 0x201, 0x0, 0x0, {}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 399.846620][T15331] loop5: p3 size 2 extends beyond EOD, truncated [ 399.882116][T15331] loop5: p4 size 32768 extends beyond EOD, truncated [ 399.911394][T15331] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 399.949775][T15331] loop5: p6 size 32768 extends beyond EOD, truncated 02:18:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={0x0}}, 0x0) 02:18:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f0000000180)=[{}, {0x9}]}) 02:18:23 executing program 4: syz_read_part_table(0x0, 0xaaaaaaaaaaaad4d, &(0x7f0000000100)) 02:18:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b66, &(0x7f0000000000)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "29e4ad2660da7aa093a301bb3cf3586ff3d128"}) 02:18:23 executing program 2: io_setup(0xaf4, &(0x7f0000000000)) io_setup(0x1, &(0x7f0000000080)=0x0) io_destroy(r0) 02:18:23 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(r1, r2) 02:18:23 executing program 3: getitimer(0x1, &(0x7f0000000180)) 02:18:23 executing program 5: setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(0x0, &(0x7f00000092c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:18:24 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f00000008c0)) 02:18:24 executing program 3: r0 = getpgid(0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000100)=0x1ff) 02:18:24 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xe8}) truncate(&(0x7f00000001c0)='./file0\x00', 0x0) 02:18:24 executing program 2: syz_mount_image$nfs(&(0x7f0000009280), &(0x7f00000092c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000009680)) 02:18:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x8, 0x0}) 02:18:26 executing program 2: rt_sigaction(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000000c0)) 02:18:26 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xe8}) truncate(&(0x7f00000001c0)='./file0\x00', 0x0) 02:18:26 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(r1, r2) 02:18:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:26 executing program 4: r0 = eventfd(0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_cancel(r1, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f00), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r0}]) 02:18:26 executing program 2: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x81, 0x0) 02:18:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x8, 0x0}) 02:18:26 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xe8}) truncate(&(0x7f00000001c0)='./file0\x00', 0x0) 02:18:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000240)) 02:18:26 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000001180), 0xffffffffffffffff) 02:18:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x8, 0x0}) 02:18:26 executing program 4: rt_sigaction(0x31, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000000c0)) 02:18:27 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0xe8}) truncate(&(0x7f00000001c0)='./file0\x00', 0x0) 02:18:27 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000), 0x0, 0xef2}]) [ 405.255346][T15469] loop2: detected capacity change from 0 to 14 [ 405.349441][T15469] Dev loop2: unable to read RDB block 14 [ 405.356545][T15469] loop2: unable to read partition table [ 405.385969][T15469] loop2: partition table beyond EOD, truncated [ 405.399055][T15469] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 405.484905][T15469] loop2: detected capacity change from 0 to 14 [ 405.556670][T15469] Dev loop2: unable to read RDB block 14 [ 405.563767][T15469] loop2: unable to read partition table [ 405.601270][T15469] loop2: partition table beyond EOD, truncated 02:18:27 executing program 1: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(r1, r2) [ 405.665513][T15469] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 02:18:29 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 02:18:29 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x8, 0x0}) 02:18:29 executing program 5: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000300)={0x2, 0x0, @remote}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) 02:18:29 executing program 2: io_setup(0x8000, &(0x7f0000000040)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000f00), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 02:18:29 executing program 1: syz_read_part_table(0x8686, 0xaaaaaaaaaaaad4d, &(0x7f0000000100)) 02:18:29 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) [ 407.462033][ T37] audit: type=1326 audit(1628043509.330:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15496 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665e9 code=0x0 02:18:29 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r2, r1) 02:18:29 executing program 4: futex(&(0x7f0000000200)=0x1, 0x4, 0x0, &(0x7f0000000240)={0x0, 0x3938700}, &(0x7f0000000280), 0x2) 02:18:29 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0xfeffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(r1, r2) timer_create(0x0, 0x0, 0x0) 02:18:29 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 02:18:29 executing program 4: syz_io_uring_setup(0x6ae6, &(0x7f0000000240), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000002c0)) 02:18:30 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:30 executing program 4: clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000003c0)=""/177, 0xb1, &(0x7f0000000480)=""/169, 0x0}, 0x58) 02:18:30 executing program 1: mq_open(&(0x7f0000000180)='+\x05\xcb\xd7\xbbNU\x9a@\x92zf3$\x1e\x0f}\\\x00', 0x0, 0x0, 0x0) 02:18:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) 02:18:30 executing program 3: syz_io_uring_setup(0x299, &(0x7f00000000c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 02:18:30 executing program 2: r0 = socket(0x11, 0x2, 0x0) recvmsg$can_raw(r0, 0x0, 0x0) 02:18:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 02:18:31 executing program 3: setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_io_uring_setup(0x2887, &(0x7f0000000040)={0x0, 0xb295, 0x8}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000200), 0x0) syz_open_dev$audion(&(0x7f0000001680), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001700), 0xffffffffffffffff) syz_io_uring_setup(0x6ae6, &(0x7f0000000240)={0x0, 0x43ce, 0x10}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000002c0)) socket(0x18, 0x3, 0x9) 02:18:31 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000440)={0x0, 0x0, r0}) 02:18:31 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000240), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000002c0)) 02:18:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x5) 02:18:31 executing program 2: clone3(&(0x7f0000000200)={0x8000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:18:32 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x0, 0x1e8, 0x1e8, 0xffffffff, 0xffffffff, 0x330, 0x330, 0x330, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x0, 0x0, 0x0, 0x4], 0x5}, {0x0, [0x0, 0x0, 0x7], 0x0, 0x4}}}}, {{@ip={@rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0xb}, 0x0, 0x0, 'syz_tun\x00', 'ip6gre0\x00', {}, {0xff}, 0x84}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@inet=@set4={{0x50}, {{0x0, 0x4}, {{}, 0x1}, {{0x8}}}}, @common=@ah={{0x30}, {[0x9]}}]}, @common=@unspec=@CLASSIFY={0x28}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'veth0_to_team\x00', 'veth1\x00'}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}, @common=@inet=@socket1={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x0, 0x0, [0x29, 0x33, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x9]}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x428) 02:18:32 executing program 1: socket$inet(0x2, 0x0, 0xa0) 02:18:32 executing program 3: syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 02:18:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 02:18:32 executing program 2: clock_getres(0x0, &(0x7f0000001200)) 02:18:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 410.836217][T15599] x_tables: duplicate underflow at hook 2 02:18:32 executing program 3: socket(0x11, 0x2, 0x8) 02:18:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) 02:18:32 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0xc0800) 02:18:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 02:18:33 executing program 1: setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = io_uring_setup(0x9f2, &(0x7f0000000180)={0x0, 0xeb3e}) syz_io_uring_setup(0x2887, &(0x7f0000000040)={0x0, 0xb295, 0x8, 0x0, 0x297, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) [ 411.135734][T15617] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 02:18:33 executing program 3: clone3(&(0x7f0000000240)={0x8800000, 0x0, 0x0, 0x0, {}, &(0x7f0000000100)=""/110, 0x6e, 0x0, 0x0}, 0x58) 02:18:34 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:34 executing program 4: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x6400, 0x0) 02:18:34 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 02:18:34 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 02:18:34 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x802) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) 02:18:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 02:18:35 executing program 2: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rfc1337\x00', 0x1, 0x0) 02:18:35 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) 02:18:35 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, 0x0) socket(0x23, 0x5, 0x0) r1 = epoll_create1(0x0) pipe2$9p(&(0x7f0000001a00), 0x0) syz_io_uring_setup(0x299, &(0x7f00000000c0)={0x0, 0x41cc, 0x0, 0x0, 0xec, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000100)=""/187, 0xbb, 0x0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1}, 0x14) fork() 02:18:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010010, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) recvfrom$inet6(r1, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r1) 02:18:35 executing program 1: syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x2b51c1844fdfe485) [ 413.341494][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:35 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 413.396901][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:18:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001400)) 02:18:36 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)) 02:18:36 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x5760, 0x0) 02:18:36 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:36 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:36 executing program 4: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) 02:18:36 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x72541) 02:18:36 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x2}, {0x9}]}) 02:18:36 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:37 executing program 4: clone3(&(0x7f0000000200)={0x8000, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/15, 0xf, 0x0, 0x0}, 0x58) 02:18:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:37 executing program 1: syz_open_dev$usbfs(&(0x7f0000000080), 0x4, 0x14140) 02:18:37 executing program 2: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:18:37 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:37 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:37 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x5761, 0x0) 02:18:37 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x0, 0x6, 0x8, 0xff}, {0x0, 0x8, 0x7, 0xffffffff}]}) 02:18:37 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:37 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:37 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000001680), 0xffffffffffffff81) 02:18:37 executing program 2: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:18:38 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x80}) 02:18:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:38 executing program 4: r0 = socket$inet(0x2, 0x3, 0xa0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 02:18:38 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:38 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:38 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x2bf, 0x0, 0x32}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x4, 0x4) shutdown(r0, 0x2) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) 02:18:38 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x541b, 0x0) 02:18:39 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)={{0x7f}}) 02:18:39 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:39 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) 02:18:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:39 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) 02:18:39 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:40 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:40 executing program 2: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000000480)=0xff) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, 0x0) 02:18:40 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:40 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:40 executing program 1: syz_io_uring_setup(0x2887, &(0x7f0000000040)={0x0, 0xb295}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) 02:18:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000)={0x0, 0xea60}, 0x10) 02:18:40 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000300)) 02:18:40 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:40 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:40 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x2}]}) 02:18:40 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{}, {0x3}}) 02:18:40 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:41 executing program 1: socket$l2tp(0x2, 0x2, 0x73) socket(0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) 02:18:41 executing program 4: openat$sysctl(0xffffffffffffff9c, &(0x7f00000044c0)='/proc/sys/net/ipv4/tcp_window_scaling\x00', 0x1, 0x0) 02:18:41 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:41 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:41 executing program 2: mq_open(&(0x7f0000000180)='+\x05\xcb\xd7\xbbNU\x9a@\x92zf3$\x1e\x0f}\\\x00', 0x40, 0x0, &(0x7f0000000080)={0x100000001, 0xd92c, 0x2, 0x97a0}) 02:18:41 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:41 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mq_notify(r0, &(0x7f0000000280)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}) 02:18:41 executing program 4: r0 = clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) clone3(&(0x7f0000000580)={0x80000000, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), {0x24}, &(0x7f00000003c0)=""/177, 0xb1, &(0x7f0000000480)=""/169, &(0x7f0000000540)=[r0, 0x0, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 02:18:41 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:41 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x4080, 0x0) 02:18:41 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:42 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:42 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 02:18:42 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 02:18:42 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:42 executing program 4: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2887, &(0x7f0000000040)={0x0, 0xb295, 0x8, 0x0, 0x297}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_open_dev$audion(&(0x7f0000001680), 0x5, 0x9400) syz_genetlink_get_family_id$devlink(&(0x7f0000001700), r0) syz_io_uring_setup(0x6ae6, &(0x7f0000000240)={0x0, 0x43ce, 0x10}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000002c0)) 02:18:42 executing program 1: socketpair(0x2, 0x0, 0x5a9, &(0x7f0000000040)) 02:18:42 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:42 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:42 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) 02:18:42 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 02:18:42 executing program 4: clone3(&(0x7f0000000240)={0x8800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:18:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:43 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:43 executing program 2: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000002580), 0x8402, 0x0) 02:18:43 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x33, @dev={0xac, 0x14, 0x14, 0x33}, 0x4e21, 0x0, 'dh\x00'}}, 0x44) [ 421.592452][T15947] IPVS: set_ctl: invalid protocol: 51 172.20.20.51:20001 02:18:43 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getpeername(r0, 0x0, &(0x7f0000000380)) 02:18:43 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 02:18:43 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="01002abd7000fddbdf25680000003000c7"], 0xc0}}, 0x0) 02:18:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000e41857000000dc"], 0x1c}}, 0x0) 02:18:43 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 422.051327][T15968] binder: 15964:15968 ioctl c0306201 0 returned -14 [ 422.051695][T15967] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 422.086533][T15969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 422.097543][T15970] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.2'. [ 422.128390][T15972] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 02:18:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="01002abd7000fddbdf256800000030"], 0xc0}}, 0x0) 02:18:44 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:44 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @random="2bc5d1d738af", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f8ca97", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100}}}}}}}, 0x0) 02:18:44 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:44 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001840), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000017c0)) [ 422.934946][T15987] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. [ 422.947178][T15988] binder: 15984:15988 ioctl c0306201 0 returned -14 [ 422.950024][T15992] ip6_tunnel: non-ECT from fc02:0000:0000:0000:0000:0000:0000:0000 with DS=0xf 02:18:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000e41857"], 0x1c}}, 0x0) [ 422.993756][T15993] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.4'. [ 423.016245][T15992] ip6_tunnel: non-ECT from fc02:0000:0000:0000:0000:0000:0000:0000 with DS=0xf 02:18:44 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:44 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:45 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) 02:18:45 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @random="2bc5d1d738af", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f8ca97", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100}}}}}}}, 0x0) [ 423.179519][T15998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 423.231705][T16004] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 423.267954][T16006] binder: 16001:16006 ioctl c0306201 0 returned -14 [ 423.315622][T16008] ip6_tunnel: non-ECT from fc02:0000:0000:0000:0000:0000:0000:0000 with DS=0xf 02:18:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:45 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:45 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) 02:18:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, 0x0, 0x0) socket(0x21, 0x5, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/55, 0x37}, {&(0x7f00000010c0)=""/1, 0x1}, {&(0x7f0000001100)=""/174, 0xae}, {&(0x7f00000011c0)=""/130, 0x82}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/132, 0x84}], 0x7}, 0x2023) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000002440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000002680)={&(0x7f0000002480)={0x1f4, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IE={0x89, 0x2a, [@ssid={0x0, 0x6, @default_ibss_ssid}, @dsss={0x3, 0x1, 0x2c}, @supported_rates={0x1, 0x5, [{0x7528698551986302}, {0x41}, {0x5a, 0x1}, {0x24}, {0x4, 0x1}]}, @gcr_ga={0xbd, 0x6}, @mesh_chsw={0x76, 0x6, {0x40, 0x3e, 0x33, 0x8617}}, @channel_switch={0x25, 0x3, {0x0, 0xab, 0x81}}, @preq={0x82, 0x5c, @not_ext={{0x0, 0x1, 0x1}, 0x5, 0x40, 0x7f, @broadcast, 0x0, "", 0x8001, 0x5, 0x6, [{{0x1}, @broadcast, 0x4}, {{}, @device_b, 0x800}, {{0x1}}, {{0x1, 0x0, 0x1}, @device_a, 0x743}, {{0x1, 0x0, 0x1}, @device_a, 0x3}, {{0x1}, @device_a, 0x4}]}}]}, @NL80211_ATTR_IE={0x14a, 0x2a, [@fast_bss_trans={0x37, 0xe9, {0x9, 0x6, "7fe59f94689f589f520ae795e93b0068", "152a7b9062e69649dc2965246d26dac5b976f1f561a8ec1fde32f93d95f3d313", "497504f2fc749f49d0dd6db5bb660baab04be3f279ae8baa8d4f555dadf30201", [{0x2, 0x1e, "b4fcb03cb80b69eb9094293a845ba8a4d831c5f0ee9f9456a70f4004e550"}, {0x0, 0xd, "9a207600aaa404f338d1006860"}, {0x1, 0x1a, "7018242108fe4008bf9b1bd8b0a6a2ef71630bd07c072826e644"}, {0x1, 0xc, "cf5d2a24cdff876c59f0b2d2"}, {0x4, 0x18, "c664c27c74b1fcda55b66876f486d6242892936867521b5d"}, {0x2, 0x22, "b7508eb1c41ecf28836ecc87f5e82fbaa2084b355b040d99826e2af5f09bdaed6e7e"}]}}, @gcr_ga={0xbd, 0x6}, @mic={0x8c, 0x10, {0xa50, "6eaa46ecc25a", @short="58e08a2a8ed6bb8c"}}, @cf={0x4, 0x6, {0x3, 0x8, 0x3, 0xfff7}}, @prep={0x83, 0x25, @ext={{}, 0x8, 0x20, @broadcast, 0x200, @broadcast, 0x2, 0x3ff, @broadcast, 0x6}}, @peer_mgmt={0x75, 0x8, {0x0, 0x101, @val, @val=0x1, @void}}, @channel_switch={0x25, 0x3, {0x0, 0xb2}}, @erp={0x2a, 0x1}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x8004}, 0x4044081) sendmsg$NL80211_CMD_GET_WOWLAN(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r5, 0x2, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x5, 0x3c}}}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24040800}, 0x40000000) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f0000002700)='nr0\x00') 02:18:45 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @random="2bc5d1d738af", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f8ca97", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100}}}}}}}, 0x0) [ 423.642459][T16021] ip6_tunnel: non-ECT from fc02:0000:0000:0000:0000:0000:0000:0000 with DS=0xf 02:18:46 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @val={0xc}}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x4}]]}, 0x3c}}, 0x0) 02:18:46 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@broadcast, @random="2bc5d1d738af", @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f8ca97", 0x44, 0x2f, 0x0, @private2, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8100}}}}}}}, 0x0) 02:18:46 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') [ 424.438207][T16045] ip6_tunnel: non-ECT from fc02:0000:0000:0000:0000:0000:0000:0000 with DS=0xf 02:18:46 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x0, 0x12}}}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x4}]]}, 0x3c}}, 0x0) 02:18:46 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) 02:18:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 02:18:46 executing program 4: msgget(0x0, 0x3a2) 02:18:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) 02:18:46 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:46 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 02:18:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) 02:18:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:47 executing program 1: shmget(0x1, 0xc000, 0x200, &(0x7f0000ff3000/0xc000)=nil) 02:18:47 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:47 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:47 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 02:18:47 executing program 4: getpid() timer_create(0x4, &(0x7f0000000000)={0x0, 0x24}, &(0x7f0000000080)) 02:18:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f0000002140), 0x0) 02:18:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 02:18:47 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:47 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00'}) 02:18:48 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x4000000, 0x0, 0x0) 02:18:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x40000020, &(0x7f0000002780)) 02:18:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 02:18:49 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:49 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:49 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x840, 0x0, 0x41) 02:18:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 02:18:49 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 02:18:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') read$FUSE(r0, 0x0, 0x0) 02:18:49 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:49 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:49 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, 0x0) 02:18:51 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000640)={0x48, 0x0, &(0x7f00000004c0)=[@register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 02:18:51 executing program 1: pselect6(0x40, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x3938700}, 0x0) 02:18:51 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000240)) 02:18:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:51 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x8011, 0x0, 0x11) 02:18:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') write$FUSE_ATTR(r0, 0x0, 0x0) 02:18:51 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 02:18:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002240)='net/ipv6_route\x00') write$P9_RMKDIR(r0, 0x0, 0x0) 02:18:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:51 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x404c084, 0x0, 0x0) [ 429.519427][T16188] binder: 16185:16188 ioctl c0306201 0 returned -14 02:18:51 executing program 4: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000440)) 02:18:51 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 02:18:51 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x440, 0x0) 02:18:51 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 02:18:51 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) [ 429.893161][T16203] binder: 16199:16203 ioctl c0306201 0 returned -14 02:18:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:52 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000006540)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x10000000) 02:18:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) 02:18:52 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 02:18:52 executing program 1: r0 = syz_io_uring_setup(0x3044, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xb, 0x0, 0x25) 02:18:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0x0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x12) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x1}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r3, 0x0, 0x0, 0x7, 0x7, 0x0) syz_io_uring_setup(0x421a, &(0x7f0000001540)={0x0, 0x62a9, 0x0, 0x2, 0xb2, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000015c0), &(0x7f0000001600)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001680)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000001640)='./file0\x00', 0x80, 0xb0402}, 0x6) syz_io_uring_setup(0xda1, &(0x7f00000016c0)={0x0, 0x66d6, 0x2, 0x0, 0x20d}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001740), &(0x7f0000001780)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) connect$pptp(r2, &(0x7f0000001800)={0x18, 0x2, {0x2, @rand_addr=0x64010101}}, 0x1e) [ 431.223272][T16231] binder: 16224:16231 ioctl c0306201 0 returned -14 02:18:53 executing program 4: pselect6(0x40, &(0x7f0000002180), 0x0, &(0x7f0000002280)={0x8}, &(0x7f00000022c0)={0x0, 0x3938700}, &(0x7f0000002340)={&(0x7f0000002300)={[0x6]}, 0x8}) 02:18:53 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000440)=0x8001) 02:18:53 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:18:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0x0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:53 executing program 4: io_setup(0x1ff, &(0x7f0000000200)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 02:18:53 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:53 executing program 1: syz_io_uring_setup(0xda1, &(0x7f00000016c0)={0x0, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001740), &(0x7f0000001780)) 02:18:53 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:18:53 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x12) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0], 0x2, 0x1}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r3, 0x0, 0x0, 0x7, 0x7, 0x0) syz_io_uring_setup(0x421a, &(0x7f0000001540)={0x0, 0x62a9, 0x0, 0x2, 0xb2, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000015c0), &(0x7f0000001600)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001680)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000001640)='./file0\x00', 0x80, 0xb0402}, 0x6) syz_io_uring_setup(0xda1, &(0x7f00000016c0)={0x0, 0x66d6, 0x2, 0x0, 0x20d}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001740), &(0x7f0000001780)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) connect$pptp(r2, &(0x7f0000001800)={0x18, 0x2, {0x2, @rand_addr=0x64010101}}, 0x1e) 02:18:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0x0, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:53 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x12) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x121280, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x1}) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x1ff) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) pwritev2(r3, &(0x7f00000014c0)=[{&(0x7f0000000180)="1a1da7c3", 0x4}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="0591acb7fdea140b8cb643644b321838ae94af7fd018059a79f90cbf90e6932820fa97e9e9d9e859e4db851490685a69e10ab656de861e79ec9f408a78fcaa3d75da824888cab0060041bca742ffaca1653c67adb31ae56a", 0x58}, {&(0x7f0000001240)="6171fbacb9805fa77b6f958f59822a5a6b7fc1e8c614426f3d2b35f7daaf1b77aa0179591e1baf4754fd65044870e3b9a3fcb326d0228bc30726c54201ba4b59ecc90886c1ac0eeb0875c8715b70a33163262a77a4a5daeb2d201e0b12f2d7f7d7bbcb2af4641ab8804e55d64b3351fb27928fa69a9723e235c5c7b2db6543ce758fd9295cf989b5d2ac0af725c7ec31812f0a3212f407ee9ff78ef39bdc0c9b42be98431b9209cf1649b48b684f2d09037bc5a3ee6e5429dfbff2babcf060772f0132e1", 0xc4}, {&(0x7f0000001340)="76802a7956fb68b08f7b32343131e29246dcd6f516b1f90436bb7ed0e0bbc823374d00a272dabcb0075a08da66003517760590d7303d7690d7a0f56fc65e5acec80eb2d643fa18b4de62355838367af015b7558973a041e0b2cfe246887b1d764d6c80f68375367ada510f36199700a343994486d145a66afb7ad6c3cf114c36356c0846eaf00f6475a90d", 0x8b}, {&(0x7f0000001400)="d4112073774f4f0b3aaa7f4e14e24ce787ed2ef947036469657873f8904fe05ec353f7417eb6bba95e2eecb77266a26c7aee407f32021646cfcaf6370072cc90c2cc6407dd4c0d1aa5e96fa217f0b50af7394a97976cf445e034df562784ed494d1cd89f55c92940a2c62896637e9f3874c96d8842c91ddd4252384822eaa2171d2c291ed916e00f41d951f713024f727cf38ad341bb895f1581389bd2a8574078", 0xa1}], 0x6, 0x7, 0x7, 0x11) syz_io_uring_setup(0x421a, &(0x7f0000001540)={0x0, 0x62a9, 0x0, 0x2, 0xb2, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000015c0), &(0x7f0000001600)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000001680)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000001640)='./file0\x00', 0x80, 0xb0402}, 0x6) syz_io_uring_setup(0xda1, &(0x7f00000016c0)={0x0, 0x66d6, 0x2, 0x0, 0x20d}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000001740)=0x0, &(0x7f0000001780)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) connect$pptp(r2, &(0x7f0000001800)={0x18, 0x2, {0x2, @rand_addr=0x64010101}}, 0x1e) syz_memcpy_off$IO_URING_METADATA_FLAGS(r5, 0x118, &(0x7f0000001840)=0x1, 0x0, 0x4) io_uring_setup(0x7e5c, &(0x7f0000001880)={0x0, 0xc5c4, 0x2, 0x0, 0x254}) 02:18:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="65727370616e30000000000000000000a2839db545bbe92179a16da017c5896d785451f3c89559b2dd19db1bc1fc13d57f"]}) 02:18:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:54 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:18:54 executing program 2: syz_io_uring_setup(0x3e6a, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:18:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) 02:18:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:55 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) 02:18:55 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x4, 0x0, &(0x7f00000004c0)=[@register_looper], 0x0, 0x0, 0x0}) 02:18:55 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x8, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "760ecf0f"}, 0x0, 0x0, @fd}) 02:18:55 executing program 2: r0 = syz_io_uring_setup(0x6d27, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000080)) flock(r0, 0x2) 02:18:55 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002680)={0xffffffffffffffff}, 0x4) 02:18:56 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0}) 02:18:56 executing program 1: syz_open_dev$hiddev(&(0x7f0000000000), 0x0, 0x280000) 02:18:56 executing program 4: io_setup(0x1ff, &(0x7f0000000200)=0x0) io_getevents(r0, 0xfffe, 0x0, 0x0, 0x0) 02:18:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x10, 0xffffffffffffffff, 0x0) 02:18:56 executing program 2: syz_io_uring_setup(0x6078, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), 0x0) ioctl$vim2m_VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, 0x0) syz_io_uring_setup(0x5393, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), 0x0) 02:18:56 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0}) 02:18:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:18:58 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x30, 0xffffffffffffffff, 0x10000000) 02:18:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x10, 0xffffffffffffffff, 0x0) 02:18:58 executing program 4: r0 = io_uring_setup(0x7a9b, &(0x7f0000000000)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x10000000) 02:18:58 executing program 2: syz_io_uring_setup(0x6078, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), 0x0) ioctl$vim2m_VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, 0x0) syz_io_uring_setup(0x5393, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), 0x0) 02:18:58 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0}) 02:18:58 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000006540)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) writev(r0, &(0x7f0000001380)=[{&(0x7f0000000080)="9d", 0x1}], 0x1) 02:18:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x100000c, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x2c, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0xa, 0x10, 0xffffffffffffffff, 0x0) 02:18:58 executing program 1: io_setup(0x0, &(0x7f0000000200)) r0 = syz_io_uring_setup(0x909, &(0x7f00000005c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000340), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/103, 0x67}], 0x1) 02:18:58 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 02:18:58 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000002280), &(0x7f00000022c0)={0x0, 0x3938700}, &(0x7f0000002340)={&(0x7f0000002300)={[0x6]}, 0x8}) 02:18:58 executing program 3: syz_io_uring_setup(0x6078, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) io_uring_setup(0x2cde, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, 0xa}) 02:19:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) 02:19:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) connect$pptp(r0, &(0x7f0000001800), 0x1e) 02:19:00 executing program 4: syz_usb_connect$uac1(0x4, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x1, 0x9}}}}}}}]}}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 02:19:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x6, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:00 executing program 3: syz_io_uring_setup(0x6078, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x30}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000006540)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, 0x0, 0x25) r1 = syz_io_uring_setup(0x5393, &(0x7f0000000140)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000240)=[0xffffffffffffffff], 0x1) ioctl$vim2m_VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 02:19:00 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x9, 0x0) 02:19:00 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x101841, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000c40)=""/73, 0x49}) 02:19:00 executing program 2: syz_io_uring_setup(0x3044, &(0x7f0000000300), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000380), 0x0) syz_io_uring_setup(0x1e37, &(0x7f0000000000)={0x0, 0x115e}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:19:00 executing program 1: syz_io_uring_setup(0x7044, &(0x7f0000000300)={0x0, 0x0, 0x15}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000000c0)) 02:19:00 executing program 3: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 02:19:01 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x20, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x0, 0x0, 0x100000001}) [ 439.652334][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.658700][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 02:19:02 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:02 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0xf8252543138537d8, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 02:19:02 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) shutdown(r0, 0x1) 02:19:02 executing program 2: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = getegid() fchown(r0, 0xffffffffffffffff, r1) 02:19:02 executing program 4: r0 = socket$inet6(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0xb8}, 0x0) 02:19:02 executing program 5: open(&(0x7f0000000000)='./file1\x00', 0x20a, 0x0) lchown(&(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, 0xffffffffffffffff) 02:19:02 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x0, 0x80000000}, 0x8) 02:19:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16], 0xb8}, 0x0) 02:19:02 executing program 4: r0 = socket$inet6(0x18, 0x2, 0x0) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0x18}, 0xc, 0x0, 0x0, 0x0, 0x160}, 0x0) 02:19:02 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0xf8252543138537d8, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x20a, 0x0) r0 = geteuid() lchown(&(0x7f0000000100)='./file1\x00', r0, 0x0) 02:19:02 executing program 2: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1008, 0x0, 0x0) 02:19:02 executing program 3: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) stat(&(0x7f0000000100)='./file1\x00', 0x0) unlinkat(r0, &(0x7f0000000000)='./file1\x00', 0x8) 02:19:03 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:03 executing program 5: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0xffffffffffffffff, 0x0) 02:19:03 executing program 4: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x200, 0x0, 0x0) 02:19:03 executing program 2: socket$inet6(0x18, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2}) 02:19:03 executing program 1: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) utimensat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000100), 0x0) 02:19:03 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 02:19:03 executing program 2: memfd_create(&(0x7f0000000140)='/proc/slabinfo\x00', 0x2) 02:19:03 executing program 4: epoll_create(0x3f) 02:19:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000007, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xb, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:19:03 executing program 5: timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_delete(0x0) 02:19:03 executing program 1: r0 = io_uring_setup(0x1c66, &(0x7f0000000000)={0x0, 0x0, 0x2}) io_uring_enter(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 02:19:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2802, &(0x7f0000002600)) 02:19:04 executing program 3: prctl$PR_CAPBSET_DROP(0x18, 0x4000000100014) 02:19:04 executing program 2: clock_adjtime(0x0, &(0x7f00000000c0)={0x9}) 02:19:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000007, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xb, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:19:04 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'user:', '{&^'}, 0x2c, 0xfffffffffffffffd) 02:19:04 executing program 1: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001440)={0x0}, 0x10) 02:19:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000007200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 02:19:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0)={0x2020}, 0x2020) 02:19:05 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000006180), 0x8) 02:19:05 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000007, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:19:05 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000001b80)='rxrpc\x00', &(0x7f0000001bc0)={'syz', 0x3}, 0x0) 02:19:05 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f00000005c0), 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000e00)={0x0, 0x989680}) syz_open_procfs$namespace(0x0, &(0x7f0000000e80)='ns/uts\x00') 02:19:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) 02:19:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x982, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)) 02:19:05 executing program 5: r0 = mq_open(&(0x7f0000000080)='.{\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 02:19:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x8000000) 02:19:05 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)={0x0, "45ebe9ba6b8d27e7492681bac6164bbe94f59ea87fa70bd714f4c4c1d4fe0861c46b16fb6b71acc1334bc37c2dfb6186349567ad08a5641b8139707a05f87959"}, 0x48, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000380)='\x00', 0x0) 02:19:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x0, 0x0, 0x0, &(0x7f0000001a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 02:19:06 executing program 5: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0xd}) 02:19:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000007, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xb, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:19:06 executing program 4: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f00000014c0)={[{@fat=@codepage={'codepage', 0x3d, '852'}}]}) 02:19:06 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x3, 0x2800) 02:19:06 executing program 1: syz_io_uring_setup(0x0, &(0x7f0000001b80), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000001c00), &(0x7f0000001c40)) 02:19:06 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xffffffffffffff50) 02:19:06 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000001440)={0x2020, 0x0, 0x0, 0x0}, 0x2020) newfstatat(0xffffffffffffff9c, &(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) keyctl$chown(0x4, 0x0, 0x0, r3) geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x29c4408, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10000}}, {@max_read={'max_read', 0x3d, 0x85e}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x10000}}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_user={'obj_user', 0x3d, '}-\'\xd8&'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '[\\{^(\''}}]}}) write$FUSE_LK(r0, &(0x7f00000001c0)={0x28, 0x0, r1, {{0x7}}}, 0x28) umount2(&(0x7f0000000080)='./file0\x00', 0x2) socket$netlink(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000004, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 444.827835][T16587] FAT-fs (loop4): bogus number of reserved sectors [ 444.866622][T16587] FAT-fs (loop4): Can't find a valid FAT filesystem 02:19:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) 02:19:06 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) [ 444.965097][T16587] FAT-fs (loop4): bogus number of reserved sectors [ 445.001917][T16587] FAT-fs (loop4): Can't find a valid FAT filesystem 02:19:06 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0x13, 0x0, 0x0, 0x0) 02:19:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000004180), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 02:19:08 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 02:19:08 executing program 5: syz_io_uring_setup(0x4c76, &(0x7f0000002840)={0x0, 0x400000, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000028c0), &(0x7f0000002900)) 02:19:08 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x2830, 0xffffffffffffffff, 0x8000000) 02:19:08 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"73ef435d44a3be583b024fe2b0978715"}) 02:19:08 executing program 3: bpf$ITER_CREATE(0x16, &(0x7f0000000380), 0x8) 02:19:08 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:08 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x3, 0x2) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") splice(r1, &(0x7f0000000300)=0x3, r1, &(0x7f0000000340)=0x100000000, 0x1, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x28) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[], 0x9c) splice(r2, &(0x7f0000000200)=0xa45b, r4, &(0x7f00000002c0)=0x152d, 0x0, 0x5) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) accept4(r5, 0x0, &(0x7f0000000100), 0x400) 02:19:08 executing program 4: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/51) 02:19:08 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000040), 0x0) 02:19:08 executing program 3: syz_io_uring_setup(0x18, &(0x7f0000000000), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:19:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:08 executing program 1: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x3, 0x4) syz_io_uring_setup(0x3099, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_setup(0x4c3e, &(0x7f0000000140)) syz_io_uring_setup(0x6cbf, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, 0x38c}, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x204100, 0x0) syz_io_uring_setup(0x54d1, &(0x7f0000000500)={0x0, 0x0, 0x2, 0x0, 0x56}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) 02:19:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x6}, {0xf}, {0x7}]}]}}, &(0x7f0000000080)=""/181, 0x3e, 0xb5, 0x100}, 0x20) 02:19:08 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f00000001c0)=0x3) 02:19:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) 02:19:09 executing program 4: msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000000c0)=""/85) 02:19:09 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000001200)={@multicast, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a5e62", 0x14, 0x6, 0x0, @remote, @dev, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 02:19:09 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:09 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x3, 0x2) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") splice(r1, &(0x7f0000000300)=0x3, r1, &(0x7f0000000340)=0x100000000, 0x1, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x28) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[], 0x9c) splice(r2, &(0x7f0000000200)=0xa45b, r4, &(0x7f00000002c0)=0x152d, 0x0, 0x5) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) accept4(r5, 0x0, &(0x7f0000000100), 0x400) 02:19:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000040)='syzkaller\x00', 0x800, 0x82, &(0x7f0000000080)=""/130, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:09 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000600)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 02:19:10 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080), 0x4) 02:19:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0xffffffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x40) 02:19:10 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:10 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r0, r1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r3, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:10 executing program 1: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 02:19:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) 02:19:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x0, 0x9e5]) 02:19:10 executing program 3: r0 = getpid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x9, 0x4, @tid=r0}, &(0x7f0000001300)) 02:19:11 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x3, 0x2) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") splice(r1, &(0x7f0000000300)=0x3, r1, &(0x7f0000000340)=0x100000000, 0x1, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x28) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[], 0x9c) splice(r2, &(0x7f0000000200)=0xa45b, r4, &(0x7f00000002c0)=0x152d, 0x0, 0x5) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) accept4(r5, 0x0, &(0x7f0000000100), 0x400) 02:19:11 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x40) 02:19:11 executing program 3: syz_io_uring_setup(0x6cbf, &(0x7f00000001c0), &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x54d1, &(0x7f0000000500), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) 02:19:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, &(0x7f00000002c0)) 02:19:11 executing program 3: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:19:11 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:11 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:11 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000004200), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000001240), 0x2, 0x0) select(0x40, &(0x7f00000012c0)={0x7}, &(0x7f0000001300)={0x20}, &(0x7f0000001340), &(0x7f0000001380)={0x0, 0xea60}) 02:19:11 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000180)={@empty, @empty, @void, {@ipv4={0x800, @udp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast2, @loopback, {[@timestamp_prespec={0x44, 0x4}, @timestamp_prespec={0x44, 0x4}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 02:19:11 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/78, 0x4e) 02:19:11 executing program 3: syz_emit_ethernet(0xe81, &(0x7f00000011c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @gre={{0x17, 0x4, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @loopback, {[@lsrr={0x83, 0x3}, @ssrr={0x89, 0x17, 0x0, [@loopback, @empty, @local, @multicast2, @multicast2]}, @cipso={0x86, 0x6}, @ra={0x94, 0x4}, @cipso={0x86, 0x21, 0x0, [{0x0, 0x3, "14"}, {0x0, 0x2}, {0x0, 0x7, "459acea459"}, {0x0, 0xd, "dff33b90b11116273695ce"}, {0x0, 0x2}]}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xc60, 0x0, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0, 0x0, 0x0], "7565251f2899f41483936693ad80479d8cc7d1b33d3a4a892fb00a824402b9ae4bc34c1bf406fd325c351d17f73e64525320e8434524e128a79166290f2511bd1a251539e29dddf48613fec58e42c699186cb4638062b20903407dc8772c5e8e464767c2e7ce100afd66ab9890a1273c8b4565bb472a06"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0], "515d1cda1129d77375d264d8b80bde9a8b3af7357fc6d90ac6469cacd965da23736de758c80b70b649c4681b22e55d6b1490cfdfd88bd2ec82ff8537ed98f194aad06bbce2823d244a5fc4c47e160978a65c6a8f7fedc21fc443222842241596027f08db031faa3a6640e18e34a930d246db33afd429ed309b3d9a2df80424307492f9f7fcfc4b0c95fdb0bca9e8c78f3df0ecb03812d5bb2d4ca2e8af6b04ca394a872e62375701a3fbf4883fca139986"}, {}, {}, {0x8, 0x6558, 0x0, "09f23cef4caa8be1ba0ad2b36bbe9b3c63a72e33960777e3a1c21728807fd6433984f8699167784d19122f2660fedd81e65c301749686e693ba407da36"}}}}}}, 0x0) 02:19:12 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000180), 0x3, 0x2) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") splice(r1, &(0x7f0000000300)=0x3, r1, &(0x7f0000000340)=0x100000000, 0x1, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff232, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x88002, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x28) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[], 0x9c) splice(r2, &(0x7f0000000200)=0xa45b, r4, &(0x7f00000002c0)=0x152d, 0x0, 0x5) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) accept4(r5, 0x0, &(0x7f0000000100), 0x400) 02:19:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0xc01047d0, 0x0) 02:19:12 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/78, 0x4e) 02:19:12 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:12 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 02:19:12 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@multicast, @link_local, @val={@void}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "dfd02c", 0x20, 0x6, 0x0, @remote, @mcast2, {[], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 02:19:12 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000900), 0x14200, 0x0) 02:19:12 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 02:19:12 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/78, 0x4e) 02:19:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r1) 02:19:13 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 02:19:13 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:14 executing program 4: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:19:14 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/78, 0x4e) 02:19:14 executing program 3: syz_emit_ethernet(0xe81, &(0x7f00000011c0)={@local, @empty, @val={@void}, {@ipv4={0x800, @gre={{0x16, 0x4, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @loopback, {[@lsrr={0x83, 0x3}, @ssrr={0x89, 0x17, 0x0, [@loopback, @empty, @local, @multicast2, @multicast2]}, @cipso={0x86, 0x6}, @ra={0x94, 0x4}, @cipso={0x86, 0x1d, 0x0, [{0x0, 0x3, "14"}, {0x0, 0x2}, {0x0, 0x7, "459acea459"}, {0x0, 0xb, "dff33b90b111162736"}]}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xc64, 0x0, [], "50f047cfb890d7867f53c46437994800198fe5b803c40e07a6238616da74a284c70f602e0412b498bc1a9e226e0e30adf1c4eb551e1a68d3877bfd56422991507adb3b22bf59b4bed34a9bc0345cf3873d17f45c117cf4057871d32b3b78497a0e3593dae11ccd23019aa78ced965e95fae44392fe7fc87756b86260731c6f241f130e11305d816d5d7127f6c8c52794819577b8690b9d4b720b85630845d7ba40ae9c71863156da9ce18b4c0b05acaa41e99f507d310b28027a57d680dbfbd7c260a812718a171886cd0bc5af97dcd82fd0374eb9af4e24cf0b7ccddb60697844d261c6ff2440c9bd3cc609b51dc2932b36f874aedda5b95d8f11a4b6161329724772dc9a8e266b99065dcc2c9370ba6af9566389477744534fce0fef54045bbfc968109758a480d9e99cf0f80821f81e29bbc9709958c21f5de6ffa9247dc5732d1d876705c29b5b8a0b368cf87a2136fa43b316189cf5f6cdf8e13c9555f21e1453ffd035b1c43d8ece0d82c03efb66e4c48f50aef453b8557a8140cfeec166191179e003dd6628a7b0517758ce4aec0f72461e7906be09d2da96d22b4e5f23647e13e58df0346ac06e7197ee8e2b32af03976ff61d3b8697b1622c3f6fd6331a8376d0e228fd85cc77f7fa78d689ec95bfd05272780529226b00500b972272fd7590645201a3cde17a5bc016f11b895afa985ccdef3c9dc39d4ae7d30808e8c6126e99be214f8494b9687036cf91d1159bbb5a0c58ad91a21279e6c0936b139101641506b8b2e54f8c444e86fe1c23d1eeaf401e48b9acd522405d3a2cb5c3412788062ad5a9c433ddcaa6f0229bd0a558dbb3f97f5fee9f329fbf5aa4ca127ec9fb44ed9f1b48bb312f7b84956f8204cd57c3de3d58e7c3a5a8812445050ac612c8a20446b06d5678e890707de085516f309348d664e126fef27b08a84926283132a0d338da09a5930ff3c6b28b7617c0908fda9269a53deca9e9e1699c61c68ae4b33c191fd52e249ef98ad469ba77ac81f598597eb6e72deb136a9cf69dfaa7f02dd4e0d676501833c578a018b7eab5de9c019e74ae524482a098d131ca26cc80c9b2a88b1e2810a950937d49f2871690a0a4e723c9dc6a3a446b0e92f279270c467224de7a9c67c111c398c23b4ae0ba13632a88be611c67a5b8ff42ef8598edd480e805f672ded85e1fce57ebbbb6d565ace43339d6d793e1ba1995e34382f269da6519654b6b5e3330150ec469e25343bb32f26a16ca218480e05438ea1464af685f174184b49db1a21d632ec68f8362fac7660e5356220c0e36f10ea2d9d73556e431efec5c8beaf52adf4369db484b3cc82fa70186cfa549b8d1a0ca1691c6419ed0f8744a6e6a28dccf802555da92a890d27550af646ee84c3a83ccf08c85d2ff82266639a544e2b488061040c66a3493eaa951e7eb5e14d7c37d36fe9b6b8d3608351dc3db712ec303e0cdbe3c76e7ed2f23cf8b3de8c06ab16375fee672c8a16cf041d365b21bf5fa28b14a7a7fbe774e00e59cb8cda8e50bbfb1db440c1407f76938bcdc7e96d3899de91df4bbc3bd86c994bcc5ab6627b61efe2a4f9486fb69c7f23f47cab04beaaa7fffddffc187f7bb78c4521fc79b28a0c5cdf759fb6d1741f65b18a7829c0326279a5483f8220bec63c411d8dd57e0a5564e96ad38a38c99eb1efd122fa90797667e8cd0b5b5d2d1218c1be68ec03d5e0d651f36ea5811ead93102543ab83bd56e21da70039a86949d1dcc93b02de69593eef7dfd858fd29ed3840d5ecc8d18cf3fc84d55c37e0a82558b4aded2cdbb13742e199a30e9d8f3c60dbb111a04edb3ec78d75fef6dc4621c7adbcdaca24c96bb172799006c35d476e84c8bc29242810f7f37fcc4758541d2de7cf4e1293f4cfa1774f5f95ee9f191862306dc19df575907845aa89b54aaebb5c754fc79eaf696ae7a6634fdbaed93d0c5929af1a3e358ecaf47baac545322c84b3d8433d64d28c454f23a00294233ad615b789d7738080e05b84842b795e5e00d0a7c58c88be146ed56cfd187dca3b2330a635439c5b2cb443916bdd63717fffb72cc48d4a1959e76736ce1a1e3d80bf4cfb9d84a64060a8da69dcc328b4fab582358ff025ead2d142cf1adb0b483ace6eb0135cad251650f2a63f67517f10454e0cddd67466ca31dbba8e26cd05b043aad8cd6f458c808e1e62d2b69e150c05246ae24118f1cf8dcf14ceee50909032d698a94b4a1f45431a09627b130dacdd6c14f7adf0199d7dc67e4f6dbe8dc372ca83d718a335960cace34a3e3f8704777607303ed3f310fc057cb3bed30e892c8b3853a86b6ea6e1ce939272ab3a1726ccc3db138f3c1c009396e89a071997de9fa9d36befae4c0b04c771a1e730db077efbc249884ec58cf5627cee64353bdd97a4306276a6b2cf3292f2c6ad398fe789585d5441c6abc03a3ffa33cfa2b949b003176e0c49f658a9ef2e8993e38f9f86e7243d4a7337baa448801eba83cda2381e38b517bf3f56c964da063fcf5913acc691b9b3fbbcc4899632d953707c2374f813743df2f39be6908d5f485a2097d16a152b7daaacb6787673bc8fd0176140dca5b8af3acc3f91699a628b6d5d24e2047f3fde3817241c73078b694c4d82c935e684a0ed9e73d9fd5ff7921741705ff65f8850e61630afbb80d97a9f62b68816560b7c9a8186fbfb58f9e09abb4606565d1d131ce01f72d556f0b919bfdfe3f6e7032387309bcddaee3cb73500662db13cc83a91269c6b99b511bb00930b743f98b8bf19c60b377f18c69c1f92b02c5f42e0cce18d5933816da1a0eb46e91039729b89d0919f3ce4044066fc266d22f3417c40988f467c4af1c2adcdb9a55710bf97beca54933e2873fa7c18849e49fdabc1742c2e14c2c77d58d17bf28abae20a2e14dfafff56f573954ad26f344f38855d8d97da5ad1b5abab9cc8196d926fefbb6bdd53871f55399c718a859a96cfcdcaa2810b0f0eac45a6abc63cccd5f6612c65f58909ca5cda580b79919c8ea60c5aea6a1e792d67242dfc435aeb492d66a415d074359281711fee87a587206a576ffd4b28519ac9eaa88a71cc92dfb0a1a83d5960fa28d4516afd66f62bf4dba3d81dc104f61a1c47acca7aa7cbea04cae0fdd19dd37fb6d7f498c0770913a57e6cacd015cc87ea3debd4264b1de98007ad4e72c25cecc6f419dbb71113aceb4d02d8a5d02435247f0c59fddac616f65e302b8da4930deeecd9f389d438a11a5a47e683574af5bb16d830b7f51c42795f216727fb60a6b58d2a9261637ce217364cf5bf9fea3e51284338031c203767a791a784ef8449ff3f3e8f2b68a055b6ac392fa398f7cfa073f4203f2cbdb8cf85e58ae1d8d574e9b3847505dae99267af142821b9139ffd352dc9889d0594a11b4a4ddd05050abac66c871dda2c565f58e44fc187ecab063e01ef06e8e663c52306a9c98bb9bb352c7616e795ae965eef80e0547e7d6d305fbbb64be8bf61da5f44c5bc34ddf47a14dac30ceb07c24a8d1ac614014c8eff8f5294fb7600206ab0fa072e5611c8dfe41d86906c5273469e1bca2f92353143b6ae329a97f50994ef718908419efe246137415a64077853be99c25229102cc2ffa8d98694487839d21961ad8e8ec90e81b3f7c268227b85592c02f5802ee214562e15d84a73b654b3bf1c865fdccf43918e3f5e713f1478e3e82936ca6ccf3ac1ec0b49d1bfb1144e6a038337d720439bf00ca5dd76ba6490f911b8f59b9cf1418400688f94cb9d95c3f3d7210f0813927fff39bcec3e1affa8e12838d7bab6666235a18b6d9b451bc4c2a249a741e5a3b08c75a07fb53190c588b5d9996500dcd83d53b36aa4f78b54766a5e48d948886b3547e876666e344aaee436614519a7111e1ef7353429efa2eb3a4994ceff1f7ed93a82966a78d9ad462f7ff1dab2886e8f53224c0215eedb742b29ba0983adb41428c68bd0ad6d0d328dff5cba46d02bb2e9264f0c4233bc6b5f25a8c603b79768518fa8eef6a67fe97779167907f956d943e051a38232a89ec5516cf4d72d32e627ebf75f03568b65edaa95004e50eb8c1a25873572a90f75cec9d85abb14b475e08172da0b5c35ed5ace2d92371bcba802c11fef1a85f8210d199c502a1cd3e563e572ab02e98a8392c260613156ca831c59f454e5aba72dd1ad81d7f9f5f68e9d42e024477f4a685a9a1848b5d9c3efb833594e3b161aa7618b4d82198551dd173d46d1540bb3762f7dfe460e7552f3d24d7c1881b88228b4ea401c0b852f2ff94a4e948c0d3e647326f59b0d000f85c220e65c8e7e8377d1e93a2707299f562402b8aaf195cf2ff2a997ea693e63fffde8286530f132c9666bf4d6cf2094379ef0e899995df9d06dacb3a855554b93df51b0139ef1aead408841f55e257fe646965398419efdd730fa82b0ab8560cd7d1cf58b4f74e094a68ba9b961859146f1219ddbf40c6b619fdef5"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0, 0x0, 0x0], "7565251f2899f41483936693ad80479d8cc7d1b33d3a4a892fb00a824402b9ae4bc34c1bf406fd325c351d17f73e64525320e8434524e128a79166290f2511bd1a251539e29dddf48613fec58e42c699186cb4638062b20903407dc8772c5e8e464767c2e7ce100afd66ab9890a1273c8b4565bb472a06"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0], "515d1cda1129d77375d264d8b80bde9a8b3af7357fc6d90ac6469cacd965da23736de758c80b70b649c4681b22e55d6b1490cfdfd88bd2ec82ff8537ed98f194aad06bbce2823d244a5fc4c47e160978a65c6a8f7fedc21fc443222842241596027f08db031faa3a6640e18e34a930d246db33afd429ed309b3d9a2df80424307492f9f7fcfc4b0c95fdb0bca9e8c78f3df0ecb03812d5bb2d4ca2e8af6b04ca394a872e62375701a3fbf4883fca139986"}, {}, {}, {0x8, 0x6558, 0x0, "09f23cef4caa8be1ba0ad2b36bbe9b3c63a72e33960777e3a1c21728807fd6433984f8699167784d19122f2660fedd81e65c301749686e693ba407da36"}}}}}}, 0x0) 02:19:14 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 02:19:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:14 executing program 2: bpf$BPF_BTF_LOAD(0x1e, 0x0, 0x0) 02:19:14 executing program 3: timer_create(0x6f15500addc84ac2, 0x0, &(0x7f0000000180)) 02:19:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x4020940d, &(0x7f0000000240)=""/130) 02:19:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], ')'}]}}, &(0x7f0000000500)=""/216, 0x2a, 0xd8, 0x1}, 0x20) 02:19:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = gettid() tkill(r1, 0x33) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xd0042, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) statx(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000080)) 02:19:14 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000300)=0xd7, 0x4) 02:19:14 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, 0x0) 02:19:14 executing program 2: syz_open_dev$evdev(&(0x7f00000000c0), 0x8000, 0x200) 02:19:14 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @empty, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @local}}}}, 0x0) 02:19:14 executing program 5: syz_io_uring_setup(0x3099, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, 0x0, 0x0) syz_io_uring_setup(0x6c, &(0x7f0000000780), &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000800), &(0x7f0000000840)) 02:19:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = gettid() tkill(r1, 0x33) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xd0042, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) statx(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000080)) 02:19:14 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000003140), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240)={0x2020}, 0x2020) 02:19:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x4020940d, 0x0) 02:19:15 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000003c80), &(0x7f0000003cc0)=0x8) 02:19:15 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000240)=0x4, 0x4) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = gettid() tkill(r1, 0x33) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xd0042, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) statx(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000080)) 02:19:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:15 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) modify_ldt$read_default(0x2, &(0x7f00000007c0)=""/67, 0x43) 02:19:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x5452, &(0x7f0000000240)=""/130) 02:19:15 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0xc0189436, 0x0) 02:19:15 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={&(0x7f0000000380)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@dontfrag={{0x14}}], 0x18}, 0x0) 02:19:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x18848, &(0x7f0000001580)) 02:19:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000000940)={[], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'nl802154\x00'}}]}) 02:19:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = gettid() tkill(r1, 0x33) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0xd0042, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)) statx(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000080)) 02:19:15 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80082, 0x0) close(r0) [ 454.038278][T16926] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 454.181565][T16926] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 02:19:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0) 02:19:16 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80082, 0x0) close(r0) 02:19:16 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40284504, 0x0) 02:19:16 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x9375, &(0x7f00000000c0)="0100000000000000d8") 02:19:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, @nl=@unspec, @in={0x2, 0x0, @multicast2}, @tipc=@name}) [ 454.472696][T16945] autofs4:pid:16945:validate_dev_ioctl: invalid path supplied for cmd(0x00009375) 02:19:16 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80082, 0x0) close(r0) 02:19:16 executing program 4: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 02:19:18 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:18 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x9375, &(0x7f00000000c0)="0100000000000000d8") 02:19:18 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80082, 0x0) close(r0) 02:19:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:18 executing program 5: r0 = syz_io_uring_setup(0xda4, &(0x7f0000000440), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) 02:19:18 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x10000, 0x4) [ 457.054342][T16989] autofs4:pid:16989:validate_dev_ioctl: invalid path supplied for cmd(0x00009375) 02:19:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000001180)={0x0, 0x8, &(0x7f0000000180)="732ebca68a506883"}) 02:19:19 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 02:19:19 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x1, 0x2e, &(0x7f0000004340), 0x4) 02:19:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, 0x0, 0x0) 02:19:19 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x9375, &(0x7f00000000c0)="0100000000000000d8") [ 457.391686][T17002] autofs4:pid:17002:validate_dev_ioctl: invalid path supplied for cmd(0x00009375) 02:19:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000006000)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, 0x0, 0x0, &(0x7f0000003540)=""/160, 0xa0}}], 0x1, 0x100, 0x0) write$nbd(r1, &(0x7f0000006100)=ANY=[], 0x1001) 02:19:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:20 executing program 4: bpf$PROG_LOAD(0x9, &(0x7f0000006140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 02:19:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000004080)={0x0, 0x0, 0x0, &(0x7f0000003f00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 02:19:20 executing program 5: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000d40)='.log\x00', 0x4140, 0x0) readlinkat(r0, &(0x7f0000000140)='\x00', &(0x7f0000000180)=""/167, 0xa7) 02:19:20 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x9375, &(0x7f00000000c0)="0100000000000000d8") 02:19:20 executing program 2: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000003c0)) [ 458.648843][T17027] autofs4:pid:17027:validate_dev_ioctl: invalid path supplied for cmd(0x00009375) [ 458.677833][ T37] audit: type=1800 audit(1628043560.551:36): pid=17026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name=".log" dev="sda1" ino=15291 res=0 errno=0 02:19:20 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f0000000180)) 02:19:20 executing program 2: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x2) 02:19:20 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, 0x0, &(0x7f0000002340)) 02:19:20 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'veth0_to_bridge\x00'}) 02:19:20 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x480, 0xf0, 0xf0, 0xffffffff, 0x4e0, 0xf0, 0x4e0, 0x4e0, 0xffffffff, 0x4e0, 0x4e0, 0x5, 0x0, {[{{@ipv6={@private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'dummy0\x00', 'veth0_to_team\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv6=@local, @gre_key, @gre_key}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @multicast2}, @private1, [], [], 'gre0\x00', 'wg2\x00', {}, {}, 0x0, 0x0, 0xc}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@private2, @ipv4=@broadcast, @icmp_id, @icmp_id}}}, {{@ipv6={@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'bond_slave_0\x00', 'ipvlan0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@empty, @ipv4=@dev, @gre_key, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e0) [ 458.825793][ T37] audit: type=1800 audit(1628043560.591:37): pid=17026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name=".log" dev="sda1" ino=15291 res=0 errno=0 02:19:20 executing program 4: socket(0x10, 0x3, 0x1f) 02:19:21 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:19:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xa, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 02:19:21 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'veth0_to_bridge\x00'}) 02:19:21 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname$inet(r0, 0x0, &(0x7f0000000600)) 02:19:21 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000001700)={0x24, @short}, 0x14) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 02:19:22 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000008c0)={&(0x7f0000000740)={0x24, @short}, 0x14, &(0x7f0000000840)={&(0x7f0000000780)="b5", 0x1}}, 0x50) 02:19:22 executing program 2: r0 = socket(0x22, 0x2, 0x4) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x24000084) 02:19:22 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[{0x28, 0x0, 0x0, "82cfda0d7f6f4196abd46e75cbacc46ebc"}], 0x28}, 0x38) 02:19:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, 0x0, 0x0) 02:19:22 executing program 4: bpf$PROG_LOAD(0x4, &(0x7f0000006140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 02:19:22 executing program 1: socketpair(0x22, 0x0, 0x200, &(0x7f0000000180)) 02:19:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:23 executing program 2: socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) 02:19:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, 0x0, 0x0) 02:19:23 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000000040)={0xec4, 0x14, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "bc8553964b07f2cb1de69582b54aaa178908645153bd0a6b4745e94ca2f3aed845c5dbfebddefd95a5dd3a6ccf139c5edc86199978f270b801662dd5ff28f7ea5dfa3ae95805f6849b59356557e96c6b35a14d2a4ae47832bdb9903e55c29cd652e257c23f3c5f5c2a0063bf52bce586bfb8dc3fa129288185de2a0c77ddfecc059df5bb98fbf1a69008a4fb25610ad79e4ab5c8fdaaa574a238dea5c0d76d2330e6f3c2ec58c7af5de5fee5488aa7142b9526e268b5b3e362"}, @INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "1ad4658b37d2059ca8afa9041986029ca083a6d88ca7358ed58e58edaf1bb3e0362aacea8dc962200b4ff8b47c4ad1359e0b91c5ee1d3b680dd360af4e06b2365373d4f36de202e83008601fb31f4f8b12134787ea9a359ba98a1eeb5a2f16e94ba71eb76c7826f2ae1e1c23dea603bc64f8447ed0e5d22438"}, @INET_DIAG_REQ_BYTECODE={0xd6d, 0x1, "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"}]}, 0xec4}, 0x1, 0x0, 0x0, 0x24008041}, 0x0) 02:19:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4, "a4912173"}, &(0x7f0000000140)=0x28) 02:19:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000004340), 0x4) 02:19:23 executing program 1: r0 = socket(0x22, 0x2, 0x4) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 02:19:23 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) 02:19:23 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001b80)='ns/ipc\x00') 02:19:24 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 02:19:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 02:19:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 02:19:25 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x43}, 0x10) 02:19:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 02:19:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000000)=@raw=[@func, @func, @ldst, @map_val, @initr0, @btf_id], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xdb, &(0x7f00000000c0)=""/219, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:25 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 02:19:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:19:25 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{}, "63539868b4a29240", "c2da95f30fe557115995746487f83b629a6df3de90be3db890e5a3846c59e8e7", "da9372ae", "b853f9f2f8b3d12c"}, 0x38) 02:19:25 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000380), &(0x7f0000000400)=0x44) 02:19:25 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000000200), &(0x7f0000000240)=0x14) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000440)={0x2, 'veth0_to_bridge\x00', 0x3}, 0x18) r3 = socket$l2tp(0x2, 0x2, 0x73) accept4$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14, 0x0) getsockname$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000480)={{0x2, 0x4e21, @rand_addr=0x64010100}, {0x306, @random="709331a2fe44"}, 0x10, {0x2, 0x4e22, @loopback}, 'team0\x00'}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x4) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe4, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010102}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0xc004}, 0x14008000) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 02:19:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 02:19:25 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 02:19:26 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000580)) 02:19:26 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0xd, 0x0, 0x0) 02:19:26 executing program 3: pipe(&(0x7f0000001ec0)={0xffffffffffffffff}) r1 = epoll_create(0x1ff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)) [ 464.323930][T17166] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bridge, syncid = 3, id = 0 02:19:26 executing program 5: sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x1, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) 02:19:26 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x1, 0x31, &(0x7f0000004340), 0x4) 02:19:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x8, 0x4) 02:19:27 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000580)) 02:19:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, &(0x7f0000001180)=@filter={'filter\x00', 0xe, 0x4, 0x280, 0xffffffff, 0x138, 0x138, 0x1d0, 0xffffffff, 0xffffffff, 0x268, 0x268, 0x268, 0xffffffff, 0x4, 0x0, {[{{@ip={@remote, @broadcast, 0x0, 0x0, 'geneve1\x00', 'nr0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'ipvlan0\x00'}}}, {{@ip={@private, @multicast2, 0x0, 0x0, 'bridge_slave_1\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CONNSECMARK={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'veth0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e0) 02:19:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) 02:19:27 executing program 5: sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000740)={&(0x7f0000000600), 0xc, &(0x7f0000000700)={0x0}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:19:27 executing program 4: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000004d40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 02:19:27 executing program 2: r0 = socket(0x2a, 0x2, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x0) 02:19:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{}, "8128b35feb866046", "fc62b82328bfb2f474e5baad3071e041", "4ab94fc9", "bec966f676cfb9a7"}, 0x28) 02:19:27 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 02:19:27 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000002c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) [ 465.915375][T17214] ieee802154 phy0 wpan0: encryption failed: -22 02:19:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000005080)={&(0x7f0000002100)={0xa, 0x4e21, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000005000)=[@flowinfo={{0x14}}], 0x18}, 0x0) 02:19:28 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:28 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x101) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 02:19:28 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000100), 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000280)={0x0, 0x4, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e3a06aa1"}, 0x0, 0x0, @userptr}) 02:19:28 executing program 5: syz_mount_image$nilfs2(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0x0, &(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 02:19:28 executing program 3: mq_open(&(0x7f0000000580)='\xff\xff\xff\xff\xff\xff', 0x0, 0x0, &(0x7f00000005c0)) 02:19:28 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:19:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=ANY=[]) 02:19:28 executing program 5: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), 0xffffffffffffffff) syz_mount_image$f2fs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x0, 0x3, &(0x7f0000000900)=[{&(0x7f0000000480)="56bb", 0x2, 0x4}, {&(0x7f0000000580)="b6", 0x1}, {&(0x7f0000000640)="e8", 0x1, 0x6d56b2e7}], 0x1820800, &(0x7f00000009c0)={[{@grpjquota={'grpjquota', 0x3d, 'sit0\x00'}}]}) 02:19:28 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000002c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 02:19:28 executing program 3: openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x4200) [ 467.031907][T17252] loop5: detected capacity change from 0 to 264192 [ 467.038648][T17250] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 467.137109][T17250] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:19:29 executing program 5: syz_mount_image$nilfs2(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000001900)) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:19:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@statfs_quantum}]}) [ 467.416305][ C0] blk_update_request: I/O error, dev loop5, sector 36028797018963960 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.428874][T17267] NILFS (loop5): unable to read secondary superblock (blocksize = 1024) [ 467.443314][T17267] NILFS (loop5): couldn't find nilfs on the device [ 467.582798][ C1] blk_update_request: I/O error, dev loop5, sector 36028797018963960 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 467.595320][T17267] NILFS (loop5): unable to read secondary superblock (blocksize = 1024) [ 467.626856][T17267] NILFS (loop5): couldn't find nilfs on the device 02:19:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:31 executing program 4: socketpair(0x2, 0x0, 0x0, &(0x7f0000001540)) 02:19:31 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002a40)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x40049409, 0x0) 02:19:31 executing program 5: syz_mount_image$nilfs2(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x808}], 0x0, &(0x7f0000000880)={[], [{@smackfsdef}, {@fsuuid}]}) 02:19:31 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockname(r0, 0x0, 0x0) 02:19:31 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000540), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, 0x0) [ 469.804054][T17298] loop5: detected capacity change from 0 to 8 02:19:31 executing program 1: syz_open_dev$vim2m(&(0x7f0000000100), 0x0, 0x2) io_setup(0x1001, &(0x7f0000001740)=0x0) io_submit(r0, 0x0, 0x0) 02:19:31 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002a40)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, 0x0) [ 469.879778][T17298] NILFS (loop5): couldn't find nilfs on the device 02:19:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) [ 469.975078][T17298] loop5: detected capacity change from 0 to 8 [ 470.002446][T17298] NILFS (loop5): couldn't find nilfs on the device 02:19:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x90}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x101) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 02:19:32 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x20042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 02:19:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc}]}, 0x28}}, 0x0) [ 470.487051][T17319] XFS (loop2): Invalid device [./file0], error=-15 02:19:35 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(0x0, 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:35 executing program 1: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x2000000, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xbe-*'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '&.]-^'}}]}) 02:19:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x90}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x101) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 02:19:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) tee(r0, 0xffffffffffffffff, 0xe3a, 0x0) 02:19:35 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x3f}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x9]}, 0x8}) 02:19:35 executing program 5: syz_80211_join_ibss(&(0x7f00000000c0)='wlan1\x00', &(0x7f0000000140)=@random="96", 0x1, 0x0) 02:19:35 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$qrtrtun(r0, &(0x7f00000000c0)=""/16, 0x10) 02:19:35 executing program 5: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x809c0, 0x10, 0xc}, 0x18) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}}) 02:19:35 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @remote, @remote}}) 02:19:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5}]}, 0x1c}}, 0x0) 02:19:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) 02:19:36 executing program 5: socketpair(0x8, 0x0, 0x0, &(0x7f00000002c0)) 02:19:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(0x0, 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000340)=[{0x3fc, 0x8, 0x1, 0xffff}]}) 02:19:37 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002, 0x1010, r0, 0x5a489000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) read(0xffffffffffffffff, 0x0, 0x0) 02:19:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x90}, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x101) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 02:19:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2}}) 02:19:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x300}, 0x0) 02:19:37 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x4000000) 02:19:37 executing program 5: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000001ac0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 02:19:37 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xf, &(0x7f0000000040)={0x7fffffff}, 0x8) 02:19:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @loopback}}) 02:19:37 executing program 5: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x64, '\xbe-*'}}]}) 02:19:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) [ 476.149472][T17415] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 476.186895][T17415] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 476.202437][T17415] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 476.215860][T17415] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 476.300293][T17415] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 476.316459][T17415] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 476.329754][T17415] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 476.346140][T17415] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 02:19:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(0x0, 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:19:38 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000040, 0x0) 02:19:38 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002, 0x1010, r0, 0x5a489000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) sendfile(r2, r3, 0x0, 0xf03b0000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x8000000000004) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) read(0xffffffffffffffff, 0x0, 0x0) 02:19:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:38 executing program 5: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x64, '\xbe-*'}}]}) 02:19:38 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x81) [ 476.744972][T17443] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 476.781009][T17443] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 02:19:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:38 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0x23, 0x0, 0x0) [ 476.840294][T17443] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 02:19:38 executing program 2: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}) [ 476.898229][T17443] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 02:19:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00000000c0)=""/181, &(0x7f0000000180)=0xb5) 02:19:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:39 executing program 5: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x64, '\xbe-*'}}]}) 02:19:39 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, 0x0) 02:19:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x40) 02:19:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000016c0)={'sit0\x00', &(0x7f0000001640)={'ip6_vti0\x00', 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast1}}) 02:19:39 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:39 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000001200)) [ 477.641771][T17479] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 477.677925][T17479] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 02:19:39 executing program 4: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) fcntl$setflags(r0, 0x2, 0x954dc70cb0c10b67) [ 477.744359][T17479] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 02:19:39 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) [ 477.795273][T17479] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 02:19:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x16, 0xfffffffe, 0x0, 0xffff}, 0x40) 02:19:39 executing program 5: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x64, '\xbe-*'}}]}) 02:19:39 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000ac0)="72a9ec85fec864fb3113c05356d2f2a05126d4e7a9acfeddd9f58740d66e8d524cbeec83269ba2fb3c40153b47aa81439b1dc1c73c8d955d99ea94f0dcb55814da20c97bd9914f385a57aba399996ce9ebd4e76e52deef89c44ab51ccad742d1e734e6ad9e9fc28718e1ecaebd2fde21079c515bbaa900b9f1c491ac7f0f5b5b06f7c44223bc002e89fa341a03cfa67e99c2e34f2cc9837aa364b65887aa70ae0a10e68f321ad46ed53f9a66b048e4b37bcfe4806fe0e20ede4f6244c12b0b2db3f4e8c198ef6490f1490d17feb5974e67d6487e485dfbd4ad74020fc599f0983693511e9367a5be86fb978ea7f299dcab18055ce12aa10b0ab72afa32b4391e65cc6823cb3380e25a4064e856c06c112cf27940a7a7a40b27915a68553de75d5f7321222e19ce57fdebe35b7df0c099b7a69bd610ce9f945c1750a9f5677553a17aa5671e035d72aca0f9ebfca069d3db88cd44e45f382b5dcec095860490b2777b58487b848b4c82acea290830601fb50c07172146b3d3d98b2af4d7002e43ba19146577f0a8d4dc51b6c0f111f0edda54ef6ef7ecab5f106b04780c9b5eb78623320094cc89489688f9128a92d4d9aa28bd61adecd184bce8aa250a6e07bbd1da9e97532df1f7bedf51386388a75414129d936468c612b76dc91e54585a090b643657b8b1738ae6903d92d0c09fd28efbdd1a18c49051f8b84d", 0x1fb, 0x5}]) [ 478.075689][T17507] loop4: detected capacity change from 0 to 1 [ 478.146599][T17508] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 478.154655][T17508] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 478.168178][T17507] Dev loop4: unable to read RDB block 1 [ 478.174974][T17507] loop4: unable to read partition table [ 478.183363][T17508] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 478.193021][T17507] loop4: partition table beyond EOD, truncated [ 478.211645][T17507] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 478.218373][T17508] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 02:19:40 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc) 02:19:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f0000001700)={[{@iocharset={'iocharset', 0x3d, 'maccenteuro'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'nl80211\x00'}}]}) 02:19:40 executing program 1: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:40 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_freezer_state(r0, 0x0, 0xfffffefa) 02:19:40 executing program 5: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x103) 02:19:40 executing program 3: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_setup(0x4, &(0x7f0000000100)) io_destroy(r0) 02:19:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x144003, &(0x7f0000000480)) 02:19:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000040), 0x4) 02:19:40 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:40 executing program 2: perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:19:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000540)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@norecovery}, {@attr2}]}) [ 478.873308][T17549] XFS: attr2 mount option is deprecated. [ 478.903515][T17549] XFS (loop4): no-recovery mounts must be read-only. [ 478.982909][T17549] XFS: attr2 mount option is deprecated. [ 478.988804][T17549] XFS (loop4): no-recovery mounts must be read-only. 02:19:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:41 executing program 5: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) fsetxattr(r0, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0) 02:19:41 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:41 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fcntl$setown(r0, 0x8, 0x0) 02:19:41 executing program 3: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) io_setup(0x4, &(0x7f0000000100)=0x0) io_getevents(r1, 0x0, 0x0, 0x0, 0x0) io_destroy(r0) 02:19:41 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={'trans=virtio,', {[{@version_L}]}}) 02:19:41 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0x14, 0x0, 0x0) 02:19:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000900)={'sit0\x00', 0x0}) 02:19:41 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0x8, 0x0, 0x0) 02:19:41 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:41 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x400) 02:19:41 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0x3, &(0x7f0000000040)={0x7fffffff}, 0x8) 02:19:41 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 02:19:41 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0xcdd]}, 0x8}) 02:19:41 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 02:19:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:41 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0x22, 0x0, 0x0) 02:19:42 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 02:19:42 executing program 2: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x5c00, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xbe-*'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '&.]-^'}}]}) 02:19:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 02:19:42 executing program 4: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xbe-*'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '&.]-^'}}]}) 02:19:42 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) 02:19:42 executing program 3: socketpair(0x11, 0x3, 0x0, &(0x7f0000000440)) [ 480.327063][T17618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 02:19:42 executing program 5: syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB=',appraise_type=imasig,smackfsroot=*:,']) [ 480.367379][T17618] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 02:19:42 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,block=0x']) [ 480.428410][T17618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 480.486049][T17618] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 480.600535][T17618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 480.633848][T17618] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 480.645837][T17625] gfs2meta: Unknown parameter 'appraise_type' 02:19:42 executing program 3: io_uring_setup(0x4397, &(0x7f0000001140)) [ 480.714246][T17618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 480.745639][T17618] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 02:19:42 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) [ 480.768053][T17625] gfs2meta: Unknown parameter 'appraise_type' 02:19:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:45 executing program 4: syz_mount_image$gfs2meta(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x1fc10, &(0x7f0000000400)) 02:19:45 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) 02:19:45 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x573003, 0x0) 02:19:45 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 02:19:45 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 02:19:45 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 02:19:45 executing program 3: r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000006c0), 0x1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4}) 02:19:45 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 02:19:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000d9a1bd"], 0x2c}}, 0x0) 02:19:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x2c1000a1}, 0xc) 02:19:45 executing program 3: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000000300)='./file0\x00', 0x0, 0xd00000000000000, &(0x7f0000002540), 0x0, &(0x7f0000002700)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xbe-*'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '&.]-^'}}]}) 02:19:48 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000800)={[{@nls={'nls', 0x3d, 'iso8859-1'}}, {@case_sensitive_no}, {}]}) 02:19:48 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[]) 02:19:48 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0x6, 0x0, 0x0) 02:19:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x6000}, 0x0) 02:19:48 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0x1c, 0x0, 0x0) 02:19:48 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000016c0)={'sit0\x00', &(0x7f0000001640)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast1}}) 02:19:48 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x0) read$rfkill(r0, 0x0, 0x0) [ 486.331804][T17718] ntfs: (device loop5): parse_options(): Unrecognized mount option . 02:19:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) [ 486.393071][T17720] ISOFS: Unable to identify CD-ROM format. [ 486.450987][T17718] ntfs: (device loop5): parse_options(): Unrecognized mount option . 02:19:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000640)) 02:19:48 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[]) 02:19:48 executing program 2: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x1031, 0xffffffffffffffff, 0x10000000) [ 486.943903][T17742] ISOFS: Unable to identify CD-ROM format. 02:19:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:49 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:49 executing program 4: syz_io_uring_setup(0x776f, &(0x7f0000000540)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) 02:19:49 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) syz_io_uring_setup(0x2b0a, &(0x7f0000000000)={0x0, 0x3ec1}, &(0x7f0000ef2000/0x2000)=nil, &(0x7f0000e3c000/0x1000)=nil, &(0x7f0000000080), 0x0) r0 = io_uring_setup(0x5f79, &(0x7f0000000300)={0x0, 0xe893}) syz_io_uring_setup(0x7299, &(0x7f0000000380)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000d8a000/0x1000)=nil, &(0x7f0000ef4000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 02:19:49 executing program 2: syz_mount_image$efs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)}, {&(0x7f00000002c0)='C', 0x1, 0xffffffffffffffe0}], 0x2001494, 0x0) 02:19:49 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[]) [ 487.313738][T17759] loop2: detected capacity change from 0 to 16383 02:19:49 executing program 3: syz_io_uring_setup(0x776f, &(0x7f0000000540), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) 02:19:49 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440), 0x80000, 0x0) [ 487.380128][T17756] ISOFS: Unable to identify CD-ROM format. 02:19:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 487.480688][T17759] loop2: detected capacity change from 0 to 16383 02:19:49 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) 02:19:49 executing program 2: perf_event_open(&(0x7f00000002c0)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0xfed0) 02:19:49 executing program 4: r0 = socket(0x25, 0x1, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x801) [ 487.882612][T17779] ISOFS: Unable to identify CD-ROM format. 02:19:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:50 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000540), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) 02:19:50 executing program 5: syz_open_dev$sndmidi(&(0x7f00000011c0), 0x0, 0x0) 02:19:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) 02:19:50 executing program 4: openat$fb0(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000005c0)={0x0, "ffe977fd3060ccb60a2301f80f613091"}) syz_mount_image$efs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xeb, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="ab3063bc32c4cb4bd985298babddb4dac6d8de5f32d2", 0x16, 0x1}, {&(0x7f00000001c0), 0x0, 0x400}, {&(0x7f00000002c0)='C', 0x1, 0xffffffffffffffe0}], 0x2001494, &(0x7f0000000380)={[{',(-*-'}, {'-*^@('}, {}, {'.[}*\''}, {'.pending_reads\x00'}, {'.pending_reads\x00'}, {']['}], [{@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/fb0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fb0\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '.pending_reads\x00'}}]}) 02:19:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f000000af80)={0x0, 0x0, &(0x7f000000af40)={&(0x7f000000ae00)=ANY=[@ANYBLOB="08010000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fcdbdf25020000006400018008"], 0x108}}, 0x0) 02:19:50 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x0, 0x81}}) [ 488.891301][T17805] ISOFS: Unable to identify CD-ROM format. [ 488.896070][T17809] loop4: detected capacity change from 0 to 16383 02:19:50 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 02:19:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 02:19:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) 02:19:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x7fffffff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x40) 02:19:51 executing program 3: openat$fb0(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/176}) r0 = syz_mount_image$efs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x1, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="0288e866ed4653b6733e782c98ddd544b8e45c7ab4784c4c9beed82f9f9def6ae3d8a3de25b6ceb5bdd7a94766665b09e2e9e552f6b07989555680b8b75692e6f1ec9b84bfdd2d10c7c53b243614e1913e227e1bce9bf5b62480a0ecbdb4fffc29f0394fb0e00eaed16f9c6ccb7da217a0", 0x71, 0x7}], 0x800000, &(0x7f00000002c0)={[{'/dev/fb0\x00'}], [{@dont_appraise}, {@permit_directio}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type}, {@smackfsroot={'smackfsroot', 0x3d, 'wireguard\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '=,{\x1c:'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfshat}, {@audit}, {@hash}]}) openat$incfs(r0, &(0x7f0000000380)='.pending_reads\x00', 0x240080, 0x12) socket$nl_generic(0x10, 0x3, 0x10) [ 489.402824][T17824] ISOFS: Unable to identify CD-ROM format. 02:19:51 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[@ANYRES16], 0x250}}, 0x0) 02:19:51 executing program 5: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) 02:19:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="40030000", @ANYRES16=r1, @ANYBLOB="010029bd7000fbdbdf250c0000000c0003800800010004000000bc000580080001"], 0x340}}, 0x0) 02:19:51 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) 02:19:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 489.835437][T17847] netlink: 612 bytes leftover after parsing attributes in process `syz-executor.4'. 02:19:51 executing program 2: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc8f56f5da71c5a95) [ 489.890699][T17847] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. 02:19:51 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 02:19:51 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) 02:19:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000000c0)=0xc) [ 489.993406][T17856] netlink: 612 bytes leftover after parsing attributes in process `syz-executor.4'. [ 490.030528][T17856] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.4'. 02:19:52 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f00000000c0)) 02:19:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000003b80)={&(0x7f0000000000)=ANY=[], 0x14}}, 0x0) 02:19:54 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) 02:19:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000240)={0x0, 0x0}) 02:19:54 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x1) read$rfkill(r0, 0x0, 0x0) 02:19:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) 02:19:54 executing program 4: bpf$PROG_LOAD(0x12, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:54 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 02:19:54 executing program 3: openat$fb0(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 02:19:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 02:19:54 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000fea000/0x13000)=nil, 0x13000, 0x4, 0x12, r0, 0x10000000) 02:19:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,blo']) 02:19:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000100)) 02:19:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:56 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:19:56 executing program 3: recvfrom$phonet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000012040)={&(0x7f0000000080), 0xc, &(0x7f0000012000)={&(0x7f0000011e40)={0x38, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xfffffffffffffd66, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x38}}, 0x0) 02:19:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 02:19:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x5c}}, 0x0) 02:19:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000000)=ANY=[], 0x250}}, 0x0) [ 494.657526][T17938] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 02:19:56 executing program 4: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002900), 0x4043) 02:19:56 executing program 3: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000500)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000d87000/0x4000)=nil, &(0x7f0000fbd000/0x3000)=nil, &(0x7f0000dd5000/0x2000)=nil, &(0x7f0000cb5000/0x13000)=nil, &(0x7f0000d93000/0x4000)=nil, &(0x7f0000ea7000/0x4000)=nil, &(0x7f0000ef9000/0x4000)=nil, 0x0}, 0x68) 02:19:56 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:19:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:19:56 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:58 executing program 5: r0 = socket(0x25, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, 0x0, 0x0) 02:19:58 executing program 4: syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040801}, 0x4000000) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440), 0x80000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000a00)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x200000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000bc0)) 02:19:58 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:19:58 executing program 2: syz_mount_image$efs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 02:19:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x80, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:19:58 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:59 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet,b']) 02:19:59 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000001cc0), 0x40, 0x0) 02:19:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x390, 0x0, 0x400}, 0x98) 02:19:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000a00)) 02:19:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:19:59 executing program 3: r0 = socket(0x28, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) 02:19:59 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) mmap$fb(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xa, 0x11, r0, 0x0) 02:19:59 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoliet']) 02:19:59 executing program 5: syz_io_uring_setup(0x2b0a, &(0x7f0000000000), &(0x7f0000ef2000/0x2000)=nil, &(0x7f0000e3c000/0x1000)=nil, 0x0, 0x0) io_uring_setup(0x5f79, &(0x7f0000000300)={0x0, 0xe893}) syz_io_uring_setup(0x7299, &(0x7f0000000380), &(0x7f0000d8a000/0x1000)=nil, &(0x7f0000ef4000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 02:19:59 executing program 2: syz_mount_image$jffs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000200)}], 0x12550c9, &(0x7f0000000400)) [ 497.951129][T18028] ISOFS: Unable to identify CD-ROM format. 02:20:01 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x3ffffe}, 0xc) 02:20:01 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'xfrm0\x00'}}]}, 0x38}}, 0x0) 02:20:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x1ba, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000180)) 02:20:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000bc0)) 02:20:01 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) [ 500.021848][T18061] xfrm0 speed is unknown, defaulting to 1000 [ 500.058059][T18061] xfrm0 speed is unknown, defaulting to 1000 02:20:01 executing program 4: openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 02:20:02 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) 02:20:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f00000009c0), 0x0, 0x0, 0x0, 0x0) [ 500.107678][T18061] xfrm0 speed is unknown, defaulting to 1000 02:20:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x1ba, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000180)) 02:20:02 executing program 5: syz_mount_image$efs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="ab", 0x1}, {&(0x7f00000002c0)='C', 0x1, 0xffffffffffffffe0}], 0x0, 0x0) 02:20:02 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojoli']) [ 500.676394][T18082] loop5: detected capacity change from 0 to 16383 [ 500.741481][ T9606] xfrm0 speed is unknown, defaulting to 1000 [ 500.752795][T18061] infiniband syz2: set down [ 500.765005][T18061] infiniband syz2: added xfrm0 [ 500.972743][T18061] RDS/IB: syz2: added [ 500.984871][T18061] smc: adding ib device syz2 with port count 1 [ 501.012855][T18061] smc: ib device syz2 port 1 has pnetid [ 501.064516][ T20] xfrm0 speed is unknown, defaulting to 1000 [ 501.105129][T18061] xfrm0 speed is unknown, defaulting to 1000 [ 501.112546][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.119033][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.536920][T18061] xfrm0 speed is unknown, defaulting to 1000 [ 502.084459][T18061] xfrm0 speed is unknown, defaulting to 1000 [ 502.885003][T18061] xfrm0 speed is unknown, defaulting to 1000 02:20:04 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:04 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) [ 503.264590][T18061] xfrm0 speed is unknown, defaulting to 1000 [ 503.711087][T18061] xfrm0 speed is unknown, defaulting to 1000 02:20:06 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'xfrm0\x00'}}]}, 0x38}}, 0x0) 02:20:06 executing program 2: syz_io_uring_setup(0x2b0a, &(0x7f0000000000), &(0x7f0000ef2000/0x2000)=nil, &(0x7f0000e3c000/0x1000)=nil, &(0x7f0000000080), 0x0) r0 = io_uring_setup(0x5f79, &(0x7f0000000300)={0x0, 0xe893}) syz_io_uring_setup(0x7299, &(0x7f0000000380)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000d8a000/0x1000)=nil, &(0x7f0000ef4000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) 02:20:06 executing program 5: r0 = socket(0x2, 0x3, 0x5) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:20:06 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:20:06 executing program 4: syz_io_uring_setup(0xeea, &(0x7f0000000100), &(0x7f0000efb000/0x4000)=nil, &(0x7f0000d87000/0x3000)=nil, &(0x7f0000000180), 0x0) 02:20:06 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendto(r0, &(0x7f0000000500)="ff", 0x1, 0x0, 0x0, 0x0) [ 504.652626][T18127] rdma_rxe: already configured on xfrm0 02:20:06 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:20:06 executing program 4: mmap$dsp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000005, 0x40030, 0xffffffffffffffff, 0x0) 02:20:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2808081, 0x0) 02:20:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x4, [@enum, @struct={0x0, 0x7, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func, @ptr, @volatile, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], '\x00'}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 02:20:07 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:07 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='.\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='hide,nojolie']) 02:20:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='ext4_es_find_extent_range_exit\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) 02:20:07 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="68756756209cee2b3b45f2687567653d"]) 02:20:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)) 02:20:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000c680)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000c680)) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000800)="fa", 0x1}], 0x1}}], 0x1, 0x0) 02:20:08 executing program 3: socket$inet(0x2, 0x3, 0xc3) [ 506.218244][T18161] tmpfs: Unknown parameter 'hugV œî+;Eòhuge' 02:20:08 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) 02:20:08 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1e0e1569e5aba36a5483b4a9cb9f5b9ca624552c2ba777d7af3de414cbf65ce4daa36a9e1713c27cd3b2bd8c3c95722df71813eb66dd81f9c0d4cd6a0d7fec", 0x17}, 0x60) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000001640)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f0000001880)=[{&(0x7f00000016c0)="ddb2c6f6c6c9f5cf8695760ee4ead24087448e5088def13ab86ed37a8c22add63416ad", 0x23}, {&(0x7f0000001700)="32ec1efbc6491d0b86c24d63a7f9c5bbe8edf33c3d58b008a243b69b97f682f8b866e33a3f4c1e7a60498ade43d6557605e96d291e874fe974f01b65fa37c5ffc40174977530ed0e6c0e6b2a679362558a5188d776e9e42bf90533cdaf0c", 0x5e}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:20:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 02:20:08 executing program 1: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, r1+60000000}}, &(0x7f0000000080)) 02:20:08 executing program 5: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x2}, 0x18) [ 506.663589][ T8466] Bluetooth: hci6: sending frame failed (-49) [ 508.698352][ T9791] Bluetooth: hci6: command 0x1003 tx timeout [ 508.725616][ T8466] Bluetooth: hci6: sending frame failed (-49) 02:20:10 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x0, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:10 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x101241) 02:20:10 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1e0e1569e5aba36a5483b4a9cb9f5b9ca624552c2ba777d7af3de414cbf65ce4daa36a9e1713c27cd3b2bd8c3c95722df71813eb66dd81f9c0d4cd6a0d7fec", 0x17}, 0x60) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000001640)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f0000001880)=[{&(0x7f00000016c0)="ddb2c6f6c6c9f5cf8695760ee4ead24087448e5088def13ab86ed37a8c22add63416ad", 0x23}, {&(0x7f0000001700)="32ec1efbc6491d0b86c24d63a7f9c5bbe8edf33c3d58b008a243b69b97f682f8b866e33a3f4c1e7a60498ade43d6557605e96d291e874fe974f01b65fa37c5ffc40174977530ed0e6c0e6b2a679362558a5188d776e9e42bf90533cdaf0c", 0x5e}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:20:10 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "1e0e1569e5aba36a5483b4a9cb9f5b9ca624552c2ba777d7af3de414cbf65ce4daa36a9e1713c27cd3b2bd8c3c95722df71813eb66dd81f9c0d4cd6a0d7fec", 0x17}, 0x60) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000001640)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x80, &(0x7f0000001880)=[{&(0x7f00000016c0)="ddb2c6f6c6c9f5cf8695760ee4ead24087448e5088def13ab86ed37a8c22add63416ad", 0x23}, {&(0x7f0000001700)="32ec1efbc6491d0b86c24d63a7f9c5bbe8edf33c3d58b008a243b69b97f682f8b866e33a3f4c1e7a60498ade43d6557605e96d291e874fe974f01b65fa37c5ffc40174977530ed0e6c0e6b2a679362558a5188d776e9e42bf90533cdaf0c", 0x5e}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:20:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000c680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r1, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12100, 0x0) sendmmsg$unix(r0, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000700)='a', 0x1}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="14"], 0x18}}], 0x1, 0x0) 02:20:10 executing program 1: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r1, &(0x7f0000008280)={0x90}, 0x90) 02:20:10 executing program 4: r0 = socket$inet(0x2, 0x3, 0xc3) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 02:20:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000280), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, 0x0) 02:20:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0xffffffffffffff2b}, 0x0) [ 510.764973][ T9552] Bluetooth: hci6: command 0x1001 tx timeout [ 510.772007][ T8466] Bluetooth: hci6: sending frame failed (-49) [ 512.844760][ T9552] Bluetooth: hci6: command 0x1009 tx timeout 02:20:19 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0) 02:20:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fstat(r0, &(0x7f0000000200)) 02:20:19 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @random, @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x6c, 0x0, @local, @rand_addr=0x64010100, {[@cipso={0x86, 0x6}]}}}}}}, 0x0) 02:20:19 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x2c4, 0xffffffff, 0x178, 0xa4, 0x178, 0xffffffff, 0xffffffff, 0x230, 0x230, 0x230, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa4}, @common=@inet=@SET3={0x34, 'SET\x00', 0x3, {{0xffffffffffffffff}, {0xffffffffffffffff, 0x0, 0xc}}}}, {{@uncond, 0x0, 0x94, 0xd4, 0x0, {}, [@common=@ttl={{0x24}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "4eb4827fc1f348b2a6fc4305f7dfb53b95822584241163b6f6f71ed6423a"}}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'ip6tnl0\x00', 'macvtap0\x00'}, 0x0, 0x94, 0xb8, 0x0, {}, [@common=@ttl={{0x24}}]}, @REJECT={0x24}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x320) 02:20:19 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200047fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 02:20:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x0, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0xffffffffffffffd4, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x0) 02:20:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000500)=@in={0x2, 0x4e21, @empty}, 0x80) 02:20:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 02:20:19 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x206c1, 0x0) 02:20:19 executing program 3: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x1}, &(0x7f0000000140)={0x7}, &(0x7f0000000180)={0x77359400}, 0x0) 02:20:19 executing program 2: r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x8, 0x20, 0x20, 0x3, 0x0, 0x10001, 0x80000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x27e1, 0x4, @perf_config_ext={0xfffffffffffffcac, 0xc2}, 0x50820, 0x3, 0xfffffffb, 0x1, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x7, r0, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xff, 0x8, 0x2, 0x1, 0x0, 0xff, 0x80010, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xcf, 0x4, @perf_config_ext={0x6, 0xf09}, 0x2000, 0x401, 0xedae, 0x7, 0x7f, 0x8001}, r1, 0x9, r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x8, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0xc004743e, &(0x7f0000000680)='&@[\xfe') r4 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0xfff, 0x90200, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x4}, 0x200, 0x1, 0x100, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x960, 0x0, 0x31c0}, r1, 0x8, r3, 0x9) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x8, 0x8, 0x40, 0x0, 0x0, 0xfffffffffffffffa, 0x1b004, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x5, 0x1c00000}, 0x10000, 0x2, 0x1f, 0x0, 0x3, 0x80000000, 0xaafc, 0x0, 0xa5, 0x0, 0x6}, 0x0, 0x6, r4, 0x0) perf_event_open(0xfffffffffffffffc, 0x0, 0xa, r2, 0xb) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x8, 0x1, 0x8, 0x2, 0x0, 0x7, 0x9208, 0xdd9da784fe6f2f18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000200)}, 0x10000, 0x5, 0x810, 0x0, 0x38, 0xfffff000, 0xff, 0x0, 0x7ff, 0x0, 0xffe000}, r1, 0xd, r6, 0x1) ioctl$TUNSETLINK(r5, 0x8912, 0x400308) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpu.stat\x00', 0x26e1, 0x0) 02:20:19 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) 02:20:19 executing program 5: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:20:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 02:20:19 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xeb, 0x10}, 0xc) r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) mkdir(&(0x7f00000008c0)='./file0\x00', 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) openat$cgroup_subtree(r1, &(0x7f00000003c0), 0x2, 0x0) recvmsg$unix(r1, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000980)={@map=0x1, r1}, 0x10) recvmsg$kcm(r1, 0x0, 0x2000) 02:20:19 executing program 2: socketpair(0x2, 0x1, 0x0, &(0x7f0000006000)) 02:20:21 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x0, 0x7, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:21 executing program 1: clone3(&(0x7f0000000300)={0xd0a00000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:20:21 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0xffffffffffffffff, 0x0, 0x40000000, 0x0) 02:20:21 executing program 5: sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, 0x0, 0x60040000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="68000000010a0108"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 02:20:21 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, 0x0) 02:20:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000300), 0x8) 02:20:21 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000e80)) [ 519.186547][T18303] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 519.219817][T18304] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 519.297175][ T37] audit: type=1400 audit(1628043621.178:38): avc: denied { sys_admin } for pid=18298 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 02:20:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004300)={&(0x7f0000000000)='thermal_temperature\x00'}, 0x10) 02:20:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000280)=""/16, &(0x7f00000002c0)=0x10) [ 519.392547][T18308] xfrm0 speed is unknown, defaulting to 1000 02:20:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r0, 0x1, 0x14, 0x0, &(0x7f00000000c0)) 02:20:21 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 02:20:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x28001400}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0xc24, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}, {0xe8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "3fd3d8c6e7416b49a807ced8e66fd34a2ec3d9756fe3f94d6f27747196a1d2e4"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "ded290bff2b1d8b70b90f87551762d47c01b99c7472afe34add3b35681ad9cc8"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5bafd886394a4f920b372e02775c62eceb92bd008e6cff9df657397f71aee7c1"}]}, {0x334, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "248d91a5a31202e4d46369066b52c875bcd922e7f25fd54f2bbbd5b503caef01"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast1}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @multicast2}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "9065e6b5e29a6fdccdc08c642d6c0fead9fc715c27f09cf16915680d5bbbcdaf"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_ALLOWEDIPS={0x274, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x100, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}]}, {0x664, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xbc, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ALLOWEDIPS={0x594, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x98, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "955b0add3a39d72ea30556d63383a196a69f2dba0a074812eeadbcaf638e19b0"}, @WGPEER_A_ALLOWEDIPS={0x3c, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x1c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x14, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @remote}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_PEERS={0x25c, 0x8, 0x0, 0x1, [{0x258, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @loopback}}, @WGPEER_A_ALLOWEDIPS={0x210, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) [ 520.030084][T18308] xfrm0 speed is unknown, defaulting to 1000 02:20:22 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x0, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:22 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000002bc0)) 02:20:22 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x24000881) 02:20:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000400)={0x0, 'veth1_virt_wifi\x00'}) 02:20:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8932, &(0x7f000000b8c0)) 02:20:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8914, &(0x7f000000b8c0)) 02:20:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) 02:20:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 02:20:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mlock2(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 02:20:23 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 02:20:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x9, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x3, 0x0, 0x0, "923d8cbadd24edd11570f329e5e821865d5d24a9753c6b96e85b571881fa36cc2be40682873d2f9f4d1346701386778f63b9427a59f85b94ba845b61c4b44089", "7f6bface10cd6f02f6955b02c8551074ebf1b8f99582ff4a362a65a9a84cbfb2"}) 02:20:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r0, 0x1, 0x3c, 0x0, &(0x7f00000000c0)) 02:20:26 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x400017e) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x10) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x8, 0x0, 0x20, 0x0, 0x700000000, 0x40750, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x9002, 0xa074, 0x4, 0x5, 0x81, 0x3, 0x4, 0x0, 0xfb, 0x0, 0x98}, 0x0, 0x2, 0xffffffffffffffff, 0x1) write$binfmt_elf64(r3, &(0x7f0000000080)=ANY=[], 0x8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) r4 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479ceef6fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0)}, {0x0}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) inotify_rm_watch(r1, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4010, r4, 0xc80ea000) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="231f5dc7dd6669ff6c653060f4cb18744ea40a527a9f2ed2df61e41508151044fbb4b9c368f36e424b6745ebee99739d0833ab157d"], 0x37) rmdir(&(0x7f0000000100)='./file1\x00') 02:20:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'vlan1\x00', @ifru_ivalue}) 02:20:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, 0x0) 02:20:26 executing program 3: socketpair(0x15, 0x5, 0x101, &(0x7f0000000180)) 02:20:26 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000009b40)='ns/pid\x00') 02:20:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f000000b8c0)) 02:20:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$sock_int(r0, 0x1, 0x19, 0x0, &(0x7f00000000c0)) [ 524.346077][T18444] ================================================================== [ 524.354780][T18444] BUG: KASAN: slab-out-of-bounds in kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 524.363758][T18444] Read of size 8 at addr ffff8880362edec0 by task syz-executor.5/18444 [ 524.372010][T18444] [ 524.374347][T18444] CPU: 1 PID: 18444 Comm: syz-executor.5 Not tainted 5.14.0-rc4-syzkaller #0 [ 524.383129][T18444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.393196][T18444] Call Trace: 02:20:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8982, &(0x7f000000b8c0)) 02:20:26 executing program 4: clock_gettime(0x4, &(0x7f00000033c0)) [ 524.396491][T18444] dump_stack_lvl+0xcd/0x134 [ 524.401206][T18444] print_address_description.constprop.0.cold+0x6c/0x2d6 [ 524.408297][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 524.414477][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 524.421007][T18444] kasan_report.cold+0x83/0xdf [ 524.425896][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 524.432071][T18444] kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 524.438078][T18444] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 524.444074][T18444] fw_pm_notify+0xa2/0x140 [ 524.448516][T18444] notifier_call_chain+0xb5/0x200 [ 524.453750][T18444] blocking_notifier_call_chain_robust+0xc4/0x160 [ 524.460194][T18444] ? blocking_notifier_chain_unregister+0x290/0x290 [ 524.466811][T18444] ? mutex_lock_io_nested+0xf00/0xf00 [ 524.472294][T18444] pm_notifier_call_chain_robust+0x26/0x60 [ 524.478169][T18444] snapshot_open+0x190/0x2a0 [ 524.482761][T18444] ? snapshot_release+0x1e0/0x1e0 [ 524.487784][T18444] misc_open+0x372/0x4a0 [ 524.492105][T18444] ? misc_devnode+0x120/0x120 [ 524.496805][T18444] chrdev_open+0x266/0x770 [ 524.501277][T18444] ? cdev_device_add+0x210/0x210 [ 524.506210][T18444] ? security_file_open+0x205/0x4f0 [ 524.511463][T18444] do_dentry_open+0x4c8/0x11d0 [ 524.516312][T18444] ? cdev_device_add+0x210/0x210 [ 524.521248][T18444] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 524.527486][T18444] ? may_open+0x1f6/0x420 [ 524.531814][T18444] path_openat+0x1c23/0x27f0 [ 524.536406][T18444] ? path_lookupat+0x860/0x860 [ 524.541188][T18444] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 524.547172][T18444] do_filp_open+0x1aa/0x400 [ 524.551671][T18444] ? may_open_dev+0xf0/0xf0 [ 524.556169][T18444] ? rwlock_bug.part.0+0x90/0x90 [ 524.561195][T18444] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 524.567435][T18444] ? _find_next_bit+0x1e3/0x260 [ 524.572534][T18444] ? _raw_spin_unlock+0x24/0x40 [ 524.577380][T18444] ? alloc_fd+0x2f0/0x670 [ 524.581718][T18444] do_sys_openat2+0x16d/0x420 [ 524.586404][T18444] ? build_open_flags+0x6f0/0x6f0 [ 524.591447][T18444] ? __context_tracking_exit+0xb8/0xe0 [ 524.596992][T18444] ? lock_downgrade+0x6e0/0x6e0 [ 524.601838][T18444] __x64_sys_openat+0x13f/0x1f0 [ 524.606686][T18444] ? __ia32_sys_open+0x1c0/0x1c0 [ 524.611725][T18444] ? syscall_enter_from_user_mode+0x21/0x70 [ 524.617796][T18444] do_syscall_64+0x35/0xb0 [ 524.622270][T18444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 524.628164][T18444] RIP: 0033:0x4665e9 [ 524.632050][T18444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 524.651755][T18444] RSP: 002b:00007f8d2b6b1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 524.660163][T18444] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 524.668217][T18444] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 524.676181][T18444] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 524.684151][T18444] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 524.692122][T18444] R13: 00007fff9bffdbff R14: 00007f8d2b6b1300 R15: 0000000000022000 [ 524.700102][T18444] [ 524.702423][T18444] Allocated by task 8550: [ 524.706735][T18444] kasan_save_stack+0x1b/0x40 [ 524.711472][T18444] __kasan_kmalloc+0x98/0xc0 [ 524.716066][T18444] __kmalloc+0x214/0x4d0 [ 524.720311][T18444] tomoyo_realpath_from_path+0xc3/0x620 [ 524.726183][T18444] tomoyo_path_perm+0x21b/0x400 [ 524.731382][T18444] tomoyo_path_rmdir+0x8e/0xd0 [ 524.736142][T18444] security_path_rmdir+0xd7/0x150 [ 524.741170][T18444] do_rmdir+0x2ae/0x480 [ 524.745339][T18444] do_syscall_64+0x35/0xb0 [ 524.749754][T18444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 524.755649][T18444] [ 524.757962][T18444] Freed by task 8550: [ 524.761927][T18444] kasan_save_stack+0x1b/0x40 [ 524.766687][T18444] kasan_set_track+0x1c/0x30 [ 524.771272][T18444] kasan_set_free_info+0x20/0x30 [ 524.776206][T18444] __kasan_slab_free+0xcd/0x100 [ 524.781061][T18444] kfree+0x106/0x2c0 [ 524.785006][T18444] tomoyo_realpath_from_path+0x191/0x620 [ 524.790807][T18444] tomoyo_path_perm+0x21b/0x400 [ 524.795654][T18444] tomoyo_path_rmdir+0x8e/0xd0 [ 524.800430][T18444] security_path_rmdir+0xd7/0x150 [ 524.805459][T18444] do_rmdir+0x2ae/0x480 [ 524.809605][T18444] do_syscall_64+0x35/0xb0 [ 524.814711][T18444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 524.820598][T18444] [ 524.822910][T18444] The buggy address belongs to the object at ffff8880362ec000 [ 524.822910][T18444] which belongs to the cache kmalloc-4k of size 4096 [ 524.836954][T18444] The buggy address is located 3776 bytes to the right of [ 524.836954][T18444] 4096-byte region [ffff8880362ec000, ffff8880362ed000) [ 524.851011][T18444] The buggy address belongs to the page: [ 524.856799][T18444] page:ffffea0000d8bb00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x362ec [ 524.866940][T18444] head:ffffea0000d8bb00 order:1 compound_mapcount:0 [ 524.873513][T18444] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 524.881494][T18444] raw: 00fff00000010200 ffffea0001f19508 ffffea00021d2808 ffff888010840900 [ 524.890159][T18444] raw: 0000000000000000 ffff8880362ec000 0000000100000001 0000000000000000 [ 524.898726][T18444] page dumped because: kasan: bad access detected [ 524.905134][T18444] page_owner tracks the page as allocated [ 524.910830][T18444] page last allocated via order 1, migratetype Unmovable, gfp_mask 0x242040(__GFP_IO|__GFP_NOWARN|__GFP_COMP|__GFP_THISNODE), pid 8550, ts 517676156994, free_ts 517599009883 [ 524.928013][T18444] get_page_from_freelist+0xa72/0x2f80 [ 524.933535][T18444] __alloc_pages+0x1b2/0x500 [ 524.938124][T18444] cache_grow_begin+0x75/0x460 [ 524.942973][T18444] cache_alloc_refill+0x27f/0x380 [ 524.947997][T18444] __kmalloc+0x3d5/0x4d0 [ 524.952232][T18444] tomoyo_realpath_from_path+0xc3/0x620 [ 524.957780][T18444] tomoyo_path_perm+0x21b/0x400 [ 524.962630][T18444] tomoyo_path_rmdir+0x8e/0xd0 [ 524.967390][T18444] security_path_rmdir+0xd7/0x150 [ 524.972416][T18444] do_rmdir+0x2ae/0x480 [ 524.976564][T18444] do_syscall_64+0x35/0xb0 [ 524.980976][T18444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 524.986867][T18444] page last free stack trace: [ 524.991522][T18444] free_pcp_prepare+0x2c5/0x780 [ 524.996375][T18444] free_unref_page+0x19/0x690 [ 525.001054][T18444] slabs_destroy+0x89/0xc0 [ 525.005465][T18444] ___cache_free+0x4c6/0x610 [ 525.010054][T18444] qlist_free_all+0x4e/0x110 [ 525.014643][T18444] kasan_quarantine_reduce+0x180/0x200 [ 525.020106][T18444] __kasan_slab_alloc+0x8b/0xa0 [ 525.024949][T18444] kmem_cache_alloc+0x25f/0x540 [ 525.029799][T18444] ptlock_alloc+0x1d/0x70 [ 525.034129][T18444] pte_alloc_one+0x68/0x230 [ 525.038653][T18444] do_huge_pmd_anonymous_page+0x5d1/0x2740 [ 525.044494][T18444] __handle_mm_fault+0x31c6/0x5320 [ 525.049610][T18444] handle_mm_fault+0x1c8/0x790 [ 525.054372][T18444] do_user_addr_fault+0x48b/0x11c0 [ 525.059522][T18444] exc_page_fault+0x9e/0x180 [ 525.064114][T18444] asm_exc_page_fault+0x1e/0x30 [ 525.068960][T18444] [ 525.071270][T18444] Memory state around the buggy address: [ 525.076887][T18444] ffff8880362edd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 525.085215][T18444] ffff8880362ede00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 525.093279][T18444] >ffff8880362ede80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 525.101326][T18444] ^ [ 525.107467][T18444] ffff8880362edf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 525.115520][T18444] ffff8880362edf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 525.123575][T18444] ================================================================== [ 525.131620][T18444] Disabling lock debugging due to kernel taint [ 525.264887][T18444] Kernel panic - not syncing: panic_on_warn set ... [ 525.271508][T18444] CPU: 1 PID: 18444 Comm: syz-executor.5 Tainted: G B 5.14.0-rc4-syzkaller #0 [ 525.281678][T18444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.291739][T18444] Call Trace: [ 525.295050][T18444] dump_stack_lvl+0xcd/0x134 [ 525.299662][T18444] panic+0x306/0x73d [ 525.303598][T18444] ? __warn_printk+0xf3/0xf3 [ 525.308201][T18444] ? preempt_schedule_common+0x59/0xc0 [ 525.313678][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 525.319845][T18444] ? preempt_schedule_thunk+0x16/0x18 [ 525.325303][T18444] ? trace_hardirqs_on+0x38/0x1c0 [ 525.330450][T18444] ? trace_hardirqs_on+0x51/0x1c0 [ 525.335681][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 525.341864][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 525.348032][T18444] end_report.cold+0x5a/0x5a [ 525.352640][T18444] kasan_report.cold+0x71/0xdf [ 525.357421][T18444] ? kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 525.363590][T18444] kill_pending_fw_fallback_reqs+0x2fb/0x370 [ 525.369583][T18444] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 525.375493][T18444] fw_pm_notify+0xa2/0x140 [ 525.379922][T18444] notifier_call_chain+0xb5/0x200 [ 525.385008][T18444] blocking_notifier_call_chain_robust+0xc4/0x160 [ 525.391444][T18444] ? blocking_notifier_chain_unregister+0x290/0x290 [ 525.398050][T18444] ? mutex_lock_io_nested+0xf00/0xf00 [ 525.403440][T18444] pm_notifier_call_chain_robust+0x26/0x60 [ 525.409264][T18444] snapshot_open+0x190/0x2a0 [ 525.413881][T18444] ? snapshot_release+0x1e0/0x1e0 [ 525.418918][T18444] misc_open+0x372/0x4a0 [ 525.423170][T18444] ? misc_devnode+0x120/0x120 [ 525.427856][T18444] chrdev_open+0x266/0x770 [ 525.432281][T18444] ? cdev_device_add+0x210/0x210 [ 525.437229][T18444] ? security_file_open+0x205/0x4f0 [ 525.442434][T18444] do_dentry_open+0x4c8/0x11d0 [ 525.447206][T18444] ? cdev_device_add+0x210/0x210 [ 525.452326][T18444] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 525.458583][T18444] ? may_open+0x1f6/0x420 [ 525.462930][T18444] path_openat+0x1c23/0x27f0 [ 525.467540][T18444] ? path_lookupat+0x860/0x860 [ 525.472319][T18444] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 525.478310][T18444] do_filp_open+0x1aa/0x400 [ 525.482998][T18444] ? may_open_dev+0xf0/0xf0 [ 525.487509][T18444] ? rwlock_bug.part.0+0x90/0x90 [ 525.492454][T18444] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 525.498707][T18444] ? _find_next_bit+0x1e3/0x260 [ 525.503574][T18444] ? _raw_spin_unlock+0x24/0x40 [ 525.508433][T18444] ? alloc_fd+0x2f0/0x670 [ 525.512861][T18444] do_sys_openat2+0x16d/0x420 [ 525.517551][T18444] ? build_open_flags+0x6f0/0x6f0 [ 525.522585][T18444] ? __context_tracking_exit+0xb8/0xe0 [ 525.528050][T18444] ? lock_downgrade+0x6e0/0x6e0 [ 525.532911][T18444] __x64_sys_openat+0x13f/0x1f0 [ 525.537768][T18444] ? __ia32_sys_open+0x1c0/0x1c0 [ 525.542729][T18444] ? syscall_enter_from_user_mode+0x21/0x70 [ 525.542761][T18444] do_syscall_64+0x35/0xb0 [ 525.542789][T18444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 525.542824][T18444] RIP: 0033:0x4665e9 [ 525.542841][T18444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 525.542866][T18444] RSP: 002b:00007f8d2b6b1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 525.542890][T18444] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 525.542907][T18444] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 525.542923][T18444] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 525.542942][T18444] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 525.542958][T18444] R13: 00007fff9bffdbff R14: 00007f8d2b6b1300 R15: 0000000000022000 [ 525.544348][T18444] Kernel Offset: disabled [ 525.637366][T18444] Rebooting in 86400 seconds..