0xee01}}, './file0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) perf_event_open(&(0x7f00000005c0)={0x3, 0x80, 0x29, 0x2, 0x1d, 0x4, 0x0, 0x100, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x8}, 0x8c02, 0x1, 0x1, 0x3, 0xfffffffffffffffc, 0x5, 0x4, 0x0, 0x8001, 0x0, 0x2}, r4, 0xf, r1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, r8, r5, 0x0, r7, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0xb, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() syz_mount_image$v7(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000bc0)=[{&(0x7f0000000340)="f3da47f30ee2125339", 0x9, 0x5}, {&(0x7f00000005c0)="a3787a27f0f7ad0c510c33224994e0b423a26ae73986f8bcbe7997afe6d2549b4bbe3bb8c313d374633c579fe32c6fe3b4bb326707919d8343a46742394509430ecebfb19d", 0x45, 0x5}, {&(0x7f0000000380)="c76f3a47982a9a8b074727a47204bf863c324321882da5b28374d7d2557c6704cdfa27", 0x23, 0x101}, {&(0x7f0000000780)="0a34523fa40e16fe2cbb08c13c05191a54c9b0fdc90ee006626c869a2c6484b0b5ca82c5c8ff734ac763080bf92d47fcfd6ad5ee26e2d7f163c89ab63a14849260b04fbbe0460c41cd698cfa64a2cda934306d67966c2e2f909481f307c6c32447673a32e07bdd9022e25e773e9ef358621334e405f44d513b76a484a22c763ba22e8a767a78d35ac366974033166575709c31095b3b6b0dcbf545f012c5d18b43663bf65c1a908e3be93dbb698dadc84d95a37004c545ff1c76a893a18bcdf74264cac0cb8610415a8926a648ac7b1fb8e644cf70bf11b8b95327195f28fa0ea99b8867a86dfd457966", 0xea, 0x80}, {&(0x7f0000000640)="97497fc0b1b2088420225bc1c8f2d12658eb6b740cc07b4cc57d6ca465775dd30f154c8eed3b7d2a9d749ecb2e0b215e079ccfe1b76b127907cd8e2e4fca6c73d94d2637f8ab4e0c9b7cda7ea47394", 0x4f, 0x7c92}, {&(0x7f00000006c0)="1996b4ef4eac15d96151b911957118bbcefa02f7045201ec7760e54cc0091f7dcbf7db32a76f15506b94a72cdaf98317e904056bce00f61f9d48eef79bcd87", 0x3f, 0xa13}, {&(0x7f0000000880)="0d4519ac8541ef2e26438ac391f25dbbb7df2196237bde85f7036f16d00009e1f96fd16f8911ccc08b9e0ad9e1c24cf8496eff734ff4d4705c8170fcc10970dc8f031ba17d34895b00b55aceee8d7aec05b431337b18100c354c1bddbdd1fc882120e8e44e58ac0cfd92b73236366a9d1b0b70eec14833f6cf25054a710a855b4e29c7f3e254571befe70adea00d541e8f9dbbfa2ec88fd39eff489b452676d71679e1069e804ff533a05389f3af0c9148c02550008f1054acd321db98cb172006115273ddf35c2a03a1e9418d50", 0xce, 0xd8e}, {&(0x7f0000000980)="e84ecca8011b10cc7dc351d35a3583027baca6b56c3714c4b65c0b35e6f2b15ee6017040bc27d8f78eabb69252079cb3905d82e4022514ec0fdaaea6a6e9e4bdd75a74f72a275e8cea4774a3892a42a2a93e6aaa48b07be6721c512fe6c7b0bf19edb23ebee7b7994985e5a4f7f2214aacffaffb733b824437526ab2e2b14beed071518bd849c9e5f9d0aa77248ddde29878b257d31aeb8d175d0a259fb7e65ad44b275aa33afbb09d3781188162d300ee128ad00b3c90959da9b3ed992a00d23ba8ce4eae10cd65d749f0e3148ef08ae2489ad0", 0xd4, 0x8}, {&(0x7f0000000a80)="002cb2c12333ce27a3213c2fcc43fac9aa7023ead11d9fa5473384368b2cc68c9e395b60008f7afebc50a29cb3dd9bfb9eb6cb4de903f4702baf9eebf183e8d6cbdb28c4b1514519198fba5e4cbc62ab17d062cd300359956d5cb67809369987c66a912032677fac2ef9db8765a6217020be62b7dec0cf5ec6f9169ebf7137077dc207f5397edce5dabf991c108e9ff64ab3feb1b4c484bbb235dd84ff874120b22c26f01e1c4146f4c9530a8f8951feeff4d1df71325a35e27d350480c41b66cef30212d4e6078e8357ddfce5fce8cc93376c7771f8df24081def33451e9cab", 0xe0, 0x3f}, {&(0x7f0000000b80), 0x0, 0x9}], 0x80000, &(0x7f0000000cc0)={[{'security.capability\x00'}, {':{&'}, {'ext4\x00'}, {'security.capability\x00'}, {')\x94(.--'}], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf00, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb000) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2042.623088] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2042.784562] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x80, 0x1f, 0x4, 0x4c, 0x0, 0x7fffffff, 0xa10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x297, 0x1, @perf_bp={&(0x7f0000000040)}, 0x40a, 0x6, 0x7f, 0x1, 0x15d, 0x1, 0x101, 0x0, 0xc4, 0x0, 0xbbf}, r2, 0x8, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb100) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2042.976066] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x8}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4402}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x7}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30002}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000000000000000000000000000000000970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000cbd115a300000000000000000000000000160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc602609426012360000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000093210000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000600000002000000000000000000000000eed6bad506089800"/764], 0xe98}}, 0x0) 07:24:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x1769, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2043.156675] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 2043.185296] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2043.248857] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb200) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2043.487036] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2043.566905] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2044.995603] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2045.002505] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2045.012099] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2045.019221] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2045.029016] device veth1_macvtap left promiscuous mode [ 2045.034361] device veth0_macvtap left promiscuous mode [ 2045.040913] device veth1_vlan left promiscuous mode [ 2045.045992] device veth0_vlan left promiscuous mode [ 2048.467419] Bluetooth: hci5: command 0x0409 tx timeout [ 2049.360906] device hsr_slave_1 left promiscuous mode [ 2049.370474] device hsr_slave_0 left promiscuous mode [ 2049.386380] team0 (unregistering): Port device team_slave_1 removed [ 2049.398613] team0 (unregistering): Port device team_slave_0 removed [ 2049.411430] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2049.422079] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2049.455472] bond0 (unregistering): Released all slaves [ 2049.470933] IPVS: ftp: loaded support on port[0] = 21 [ 2049.567029] chnl_net:caif_netlink_parms(): no params data found [ 2049.679761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2049.686227] bridge0: port 1(bridge_slave_0) entered disabled state [ 2049.700525] device bridge_slave_0 entered promiscuous mode [ 2049.711984] bridge0: port 2(bridge_slave_1) entered blocking state [ 2049.721041] bridge0: port 2(bridge_slave_1) entered disabled state [ 2049.733273] device bridge_slave_1 entered promiscuous mode [ 2049.764808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2049.780736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2049.813806] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2049.824078] team0: Port device team_slave_0 added [ 2049.836993] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2049.851746] team0: Port device team_slave_1 added [ 2049.881987] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2049.891655] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2049.927243] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2049.945460] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2049.952404] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2049.983315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2049.995884] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2050.009586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2050.045729] device hsr_slave_0 entered promiscuous mode [ 2050.053689] device hsr_slave_1 entered promiscuous mode [ 2050.064695] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2050.074778] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2050.216254] bridge0: port 2(bridge_slave_1) entered blocking state [ 2050.222679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2050.229399] bridge0: port 1(bridge_slave_0) entered blocking state [ 2050.235762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2050.306735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2050.322258] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2050.334158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2050.345723] bridge0: port 1(bridge_slave_0) entered disabled state [ 2050.354846] bridge0: port 2(bridge_slave_1) entered disabled state [ 2050.375358] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2050.381805] 8021q: adding VLAN 0 to HW filter on device team0 [ 2050.393371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2050.401460] bridge0: port 1(bridge_slave_0) entered blocking state [ 2050.407900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2050.419539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2050.427676] bridge0: port 2(bridge_slave_1) entered blocking state [ 2050.434049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2050.459042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2050.467873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2050.476958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2050.488879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2050.495802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2050.503557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2050.511901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2050.520535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2050.528813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2050.539029] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2050.545112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2050.552318] Bluetooth: hci5: command 0x041b tx timeout [ 2050.568952] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2050.577665] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2050.583975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2050.593841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2050.606234] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2050.633711] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2050.644963] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2050.653682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2050.662452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2050.719076] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2050.726326] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2050.734675] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2050.747101] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2050.753863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2050.761564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2050.769776] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2050.776743] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2050.787705] device veth0_vlan entered promiscuous mode [ 2050.798282] device veth1_vlan entered promiscuous mode [ 2050.804278] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2050.814068] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2050.828450] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2050.838137] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2050.846465] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2050.854506] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2050.862507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2050.870673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2050.881098] device veth0_macvtap entered promiscuous mode [ 2050.887853] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2050.896289] device veth1_macvtap entered promiscuous mode [ 2050.903060] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2050.913116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2050.924496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2050.934208] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2050.945854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2050.955422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2050.965292] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2050.974488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2050.984275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2050.993480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2051.003276] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.012834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2051.022608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.033639] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2051.041056] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2051.049428] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2051.056704] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2051.064218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2051.072358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2051.082961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2051.093306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.102619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2051.112476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.121827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2051.131797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.141028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2051.150990] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.160273] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2051.170139] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2051.181033] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2051.188170] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2051.195289] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2051.203519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2051.328174] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2051.334531] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2051.349386] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2051.371059] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2051.378964] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2051.380656] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2051.386095] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2051.401919] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2051.455530] device bridge_slave_1 left promiscuous mode [ 2051.464571] bridge0: port 2(bridge_slave_1) entered disabled state [ 2051.485652] device bridge_slave_0 left promiscuous mode [ 2051.492157] bridge0: port 1(bridge_slave_0) entered disabled state 07:24:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="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"/790], 0xe98}}, 0x0) 07:24:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3579, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x1800, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb300) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:19 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448d2, &(0x7f0000000180)={0x0, 0x0, "65a168"}) 07:24:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa000, 0x83) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x74, r1, 0x711, 0x0, 0x0, {0x6}, [@BATADV_ATTR_HARD_IFINDEX, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x0, 0x30, 0x1}]}, 0x24}}, 0x4000) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4401) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r5], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000380)=@nullb, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') [ 2052.409989] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2052.420497] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x141040, 0x0) [ 2052.464924] nla_parse: 12 callbacks suppressed [ 2052.464947] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2052.557594] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000019d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) [ 2052.605811] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2052.628116] Bluetooth: hci5: command 0x040f tx timeout 07:24:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fe1, 0x76f02ef68af9ef02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x5}, 0x0, 0x3d8000000, 0x0, 0x0, 0x83fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) r5 = msgget(0x2, 0x23) msgsnd(r5, &(0x7f00000005c0)={0x0, "4ba60ce2b2aca7e1b77a0424352e3974d67e1a880d64b9c7bc24d450c1397e1ecbe7e31a3ac8cedc37a02d8c7760e209e31c82c30a62b3460a71e524915111d35dd36d9ad4dd3d655c97b534c578d90dd413ab3ed472b9c8d9817c9e26481add401a6a38f7a5d9d88eb7cba7526009dcc1efc738bef0f835a5bb1251b1d733d3c46e014d18b35be72b915eab1ee3f0d5897cca0341a2c42ea0802f"}, 0xa3, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb400) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2052.671568] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2052.720131] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000001c0)="000000100048ae0000fcb80082e34084006c9b3cd2c4046724c6f34caa846ed2e527703378010040", 0x28, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) wait4(0x0, &(0x7f0000000040), 0x2, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{0x2, 0xee00, 0x0, 0x0, 0x0, 0x2, 0x7fff}, 0x0, 0x0, 0x5, 0xffff, 0x100000000, 0x0, 0x40, 0x5, 0x1, 0x4}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) chdir(&(0x7f0000000040)='./file0\x00') msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x5865, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2052.902633] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2052.921307] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb500) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2053.147522] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2053.192520] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2053.222862] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2053.270813] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006500000200001900fdf4e816636d12962826fcc6c3d5e10000900100000f000000000000000200000006000000000008000080000020000000dbf4655ff1f4655f0100ffff53ef010001000000daf4655f0000", 0x56, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x20000, 0x8}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)=ANY=[@ANYBLOB="030011000000010011ec002b512a0bbdad6ffaab18ab73572c07"], 0x1a, 0x1) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) msgctl$IPC_RMID(r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000540)={{0x0, 0x0, r5, 0xffffffffffffffff, r6, 0x102, 0x5119}, 0x0, 0x0, 0x9, 0xf99, 0x7, 0x8, 0x8, 0xbb, 0x9, 0x9, 0x0, r3}) 07:24:20 executing program 4: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x67, 0x9, 0x1ff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0xb, @dev={0xfe, 0x80, '\x00', 0x27}, 0x6}], 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() msgsnd(r2, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2053.331049] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x6000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2053.494571] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb600) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 07:24:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8910, 0x0) [ 2053.744158] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000a00)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc}}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x2c}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1042016c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x2000, 0x1) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea6101000013cd780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r4], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:21 executing program 2: process_vm_readv(0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 07:24:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb700) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2053.970320] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2054.015499] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2054.031531] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:24:21 executing program 2: r0 = gettid() process_vm_readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/130, 0x82}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000200)=""/88, 0x58}], 0x1, 0x0) [ 2054.079769] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2054.102167] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 07:24:21 executing program 2: mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 07:24:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000180)=[{r0, 0x194}, {r0}], 0x2, 0x40bc) 07:24:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x6558, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000006297a8753e5cea1ca0817a908dac4fc3d0e5cf64a2e73bceee3ec7a7d726ae"], 0xe98}}, 0x0) 07:24:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb800) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgget(0x2, 0x20) msgsnd(0x0, 0x0, 0x401, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000040)=[0xdd04, 0x81, 0x3, 0x2, 0x8], 0x5, 0x800, 0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0xa8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xff80000000000000, r2, 0x0) r3 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) msgctl$IPC_RMID(r1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2054.649773] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:21 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x5}, 0x0, 0x0, 0x0, 0x0) [ 2054.699392] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:21 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x62081, 0x0) 07:24:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xb900) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:22 executing program 2: r0 = semget(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000100)=[{0x0, 0x8c31, 0x1800}], 0x1, 0x0) 07:24:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 2055.107559] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2055.223521] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2056.761150] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2056.768484] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2056.776134] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2056.783940] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2056.794757] device veth1_macvtap left promiscuous mode [ 2056.800955] device veth0_macvtap left promiscuous mode [ 2056.806279] device veth1_vlan left promiscuous mode [ 2056.812448] device veth0_vlan left promiscuous mode [ 2060.226197] Bluetooth: hci5: command 0x0409 tx timeout [ 2061.128641] device hsr_slave_1 left promiscuous mode [ 2061.136779] device hsr_slave_0 left promiscuous mode [ 2061.152672] team0 (unregistering): Port device team_slave_1 removed [ 2061.164863] team0 (unregistering): Port device team_slave_0 removed [ 2061.175081] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2061.189907] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2061.221995] bond0 (unregistering): Released all slaves [ 2061.235150] IPVS: ftp: loaded support on port[0] = 21 [ 2061.345097] chnl_net:caif_netlink_parms(): no params data found [ 2061.463160] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.472527] bridge0: port 1(bridge_slave_0) entered disabled state [ 2061.483691] device bridge_slave_0 entered promiscuous mode [ 2061.495769] bridge0: port 2(bridge_slave_1) entered blocking state [ 2061.508782] bridge0: port 2(bridge_slave_1) entered disabled state [ 2061.519876] device bridge_slave_1 entered promiscuous mode [ 2061.552909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2061.570559] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2061.611706] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2061.621950] team0: Port device team_slave_0 added [ 2061.632740] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2061.643511] team0: Port device team_slave_1 added [ 2061.674458] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2061.683657] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2061.716998] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2061.735188] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2061.742279] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2061.773738] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2061.785693] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2061.800667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2061.839121] device hsr_slave_0 entered promiscuous mode [ 2061.845294] device hsr_slave_1 entered promiscuous mode [ 2061.855216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2061.868839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2062.023314] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.029744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.036461] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.042815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.115019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2062.131102] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2062.143752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2062.158735] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.165728] bridge0: port 2(bridge_slave_1) entered disabled state [ 2062.184193] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2062.190583] 8021q: adding VLAN 0 to HW filter on device team0 [ 2062.203618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2062.212754] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.219284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.238771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2062.247246] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.253701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.271123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2062.283511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2062.292556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2062.302735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2062.312541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2062.316102] Bluetooth: hci5: command 0x041b tx timeout [ 2062.322915] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2062.338183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2062.345636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2062.355367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2062.368201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2062.377597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2062.388005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2062.398266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2062.407769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2062.415786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2062.426936] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2062.433019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2062.449764] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2062.458203] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2062.464450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2062.471266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2062.483400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2062.501004] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2062.510864] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2062.520761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2062.529884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2062.562286] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2062.570337] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2062.579281] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2062.590567] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2062.597647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2062.605121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2062.614351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2062.623011] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2062.632370] device veth0_vlan entered promiscuous mode [ 2062.644083] device veth1_vlan entered promiscuous mode [ 2062.651133] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2062.662089] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2062.675087] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2062.685325] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2062.693240] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2062.701144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2062.708780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2062.718214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2062.729284] device veth0_macvtap entered promiscuous mode [ 2062.735646] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2062.745719] device veth1_macvtap entered promiscuous mode [ 2062.752491] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2062.763001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2062.773824] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2062.784157] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2062.794628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.804320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2062.814240] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.823550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2062.833404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.842712] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2062.852591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.861996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2062.871942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.882477] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2062.889857] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2062.898228] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2062.905655] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2062.913138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2062.921169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2062.933309] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2062.943301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.952719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2062.962783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.972002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2062.981823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2062.991003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2063.001080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2063.010243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2063.020045] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2063.031055] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2063.038408] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2063.045291] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2063.053342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2063.177446] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2063.183825] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2063.202640] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2063.215605] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2063.228558] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2063.238029] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2063.245366] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2063.253496] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:24:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x6917, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xba00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_mount_image$cramfs(&(0x7f0000000200), &(0x7f00000002c0)='./file0\x00', 0xe55, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000300)="12395b5a918d151e485a74465da05b752f461f2e23e387bf947ea38cebc6b5f371e11d84b629020ff004ce25dfce77a12d8b3b3c380d43eae5d7cec83398c64d5d1410de17f8e7c8746bb9840ae83bc95cc07f45073fca4dc410814640afb9e2ff6a3286236ff0c92027c3904910f1912460e545510af73b96573d58cd0b0cd20008d850c8fe138f977f6741cf5ead0ea5", 0x91}, {&(0x7f0000000480)="aedff402cc66b85ef732636319b2c81b130960eaa00f42ec9696a8ce28b6276891b165e0974d034841b01ee6d88a282fff391e5576fcb930317ce5201cf66478951f4067f1959259dad8", 0x4a, 0x382}], 0x16, &(0x7f0000000500)={[{'.&'}, {'%-\\()'}, {'ubifs\x00'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '['}}]}) mknodat$loop(r1, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="2a2f38625dd2b057e3b413930e0bb36b088b60868c91e7f9bbe991b11aec31af8dafa89720802facb1b195314b86bbb5465f51fd53144ab5b0c4e191b535fb37c14e17be07d9fa54ee17cf20a317242fb1", 0x51, 0x4000000, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @private2, 0x7}, 0x1c) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="2f641374b507a7197d9a9940ba3fb86783cdccece38730eaaed85c"], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) r2 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000005440)={{0x1, 0xee01, 0x0, 0x0, 0x0, 0x64, 0x1}, 0x0, 0x0, 0x80000000, 0x7f, 0x1, 0x3, 0x3ff, 0x8, 0x4, 0x82, 0x0, r2}) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x257c}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r3 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x40010140, 0x0, 0x0) 07:24:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0xa00, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r4, 0x40086408, &(0x7f00000003c0)={0x6c7}) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x8, 0x6, 0x1, 0x5, 0x0, 0x4, 0x20, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xe40a, 0x1, @perf_bp={&(0x7f0000000040)}, 0x42010, 0x6, 0x6, 0x1, 0x1, 0x400, 0x1ff, 0x0, 0x7ff, 0x0, 0x1}, r3, 0x7fff, r4, 0x2) getgroups(0x6, &(0x7f00000004c0)=[0xffffffffffffffff, r2, 0x0, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2063.381860] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:30 executing program 2: open(&(0x7f0000001280)='./file0\x00', 0x40, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000040)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0xffffffffffffffb2, 0x0) [ 2063.450832] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xbb00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 2063.663710] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8902, 0x0) 07:24:30 executing program 2: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3) 07:24:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xbc00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2063.959652] nla_parse: 7 callbacks suppressed [ 2063.959676] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2063.982482] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2064.013114] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2064.080628] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2064.128447] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x8100, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r0) 07:24:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@gettaction={0x54, 0x32, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x7ff}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x7}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x4}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0xfffffff9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004804}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) sendmsg$nl_route(r0, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f00000001c0)=@ipv4_getroute={0x1c, 0x1a, 0x4, 0x70bd27, 0x25dfdbfd, {0x2, 0x14, 0x14, 0x8, 0xfe, 0x3, 0xb6949f0eec49e7d5, 0xa, 0x2a00}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x2004c8c4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000340)=""/87) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xbd00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup(r4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x108, &(0x7f0000000040)={r3}, &(0x7f00000000c0)=0x18) [ 2064.464102] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2064.565148] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000001140)='cdg\x00', 0x4) dup2(r0, r1) 07:24:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000200)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000080)='a', 0x1}], 0x1, &(0x7f0000001440)=[@sndinfo={0x1c}], 0x1c}, 0x0) 07:24:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x200, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) r5 = gettid() wait4(r5, &(0x7f0000000040), 0x2, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000007e00)={{0x3, 0xee00, 0x0, 0xee00, 0x0, 0x0, 0xffe0}, 0x0, 0x0, 0x0, 0x10001, 0x400, 0x1, 0x9, 0x8001, 0x8001, 0x1, 0x0, r5}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xbe00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000180)='cubic\x00', 0x3) [ 2064.971840] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r4, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r5 = dup(r4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x108, &(0x7f0000000040)={r3, 0x0, 0x3}, &(0x7f00000000c0)=0x18) [ 2065.248337] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2065.351239] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2065.387666] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2065.410883] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xbf00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2065.563452] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2065.588329] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2065.950502] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2065.983613] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2067.580173] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2067.587474] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2067.595052] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2067.602309] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2067.610288] device bridge_slave_1 left promiscuous mode [ 2067.615894] bridge0: port 2(bridge_slave_1) entered disabled state [ 2067.623214] device bridge_slave_0 left promiscuous mode [ 2067.629582] bridge0: port 1(bridge_slave_0) entered disabled state [ 2067.641787] device veth1_macvtap left promiscuous mode [ 2067.647235] device veth0_macvtap left promiscuous mode [ 2067.652547] device veth1_vlan left promiscuous mode [ 2067.657770] device veth0_vlan left promiscuous mode [ 2070.635233] Bluetooth: hci5: command 0x0409 tx timeout [ 2072.030147] device hsr_slave_1 left promiscuous mode [ 2072.038725] device hsr_slave_0 left promiscuous mode [ 2072.057164] team0 (unregistering): Port device team_slave_1 removed [ 2072.069629] team0 (unregistering): Port device team_slave_0 removed [ 2072.079115] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2072.091908] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2072.124914] bond0 (unregistering): Released all slaves [ 2072.143075] IPVS: ftp: loaded support on port[0] = 21 [ 2072.243255] chnl_net:caif_netlink_parms(): no params data found [ 2072.343401] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.352064] bridge0: port 1(bridge_slave_0) entered disabled state [ 2072.359743] device bridge_slave_0 entered promiscuous mode [ 2072.367691] bridge0: port 2(bridge_slave_1) entered blocking state [ 2072.374170] bridge0: port 2(bridge_slave_1) entered disabled state [ 2072.383018] device bridge_slave_1 entered promiscuous mode [ 2072.409830] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2072.419884] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2072.444258] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2072.454283] team0: Port device team_slave_0 added [ 2072.461033] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2072.469708] team0: Port device team_slave_1 added [ 2072.493559] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2072.499888] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2072.525819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2072.539527] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2072.553284] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2072.579422] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2072.591909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2072.600550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2072.629264] device hsr_slave_0 entered promiscuous mode [ 2072.636053] device hsr_slave_1 entered promiscuous mode [ 2072.643179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2072.652749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2072.711342] Bluetooth: hci5: command 0x041b tx timeout [ 2072.755871] bridge0: port 2(bridge_slave_1) entered blocking state [ 2072.762255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2072.768967] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.775399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2072.827361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2072.838166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2072.852424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2072.861776] bridge0: port 1(bridge_slave_0) entered disabled state [ 2072.869274] bridge0: port 2(bridge_slave_1) entered disabled state [ 2072.884302] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2072.891987] 8021q: adding VLAN 0 to HW filter on device team0 [ 2072.909464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2072.917437] bridge0: port 1(bridge_slave_0) entered blocking state [ 2072.923789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2072.948360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2072.959789] bridge0: port 2(bridge_slave_1) entered blocking state [ 2072.966229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2072.978189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2073.003923] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2073.022227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2073.034109] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2073.053287] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2073.065700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2073.074206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2073.083573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2073.099505] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2073.106522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2073.118847] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2073.126084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2073.137368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2073.165635] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2073.179459] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2073.187471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2073.196176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2073.250719] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2073.259082] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2073.269162] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2073.283630] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2073.291831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2073.301119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2073.311416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2073.322068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2073.331357] device veth0_vlan entered promiscuous mode [ 2073.349241] device veth1_vlan entered promiscuous mode [ 2073.361032] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2073.373254] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2073.391809] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2073.402163] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2073.410587] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2073.419524] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2073.428008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2073.436567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2073.448888] device veth0_macvtap entered promiscuous mode [ 2073.457404] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2073.471436] device veth1_macvtap entered promiscuous mode [ 2073.478793] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2073.490121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2073.502167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2073.511296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2073.521219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.530391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2073.540167] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.549335] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2073.559210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.569259] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2073.581254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.601371] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2073.612984] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.625857] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2073.633016] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2073.640668] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2073.648515] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2073.656636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2073.664800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2073.679325] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2073.689197] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.699413] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2073.709982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.719751] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2073.730097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.739830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2073.750131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.759857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2073.770164] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2073.781208] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2073.788725] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2073.796534] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2073.804333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2073.942169] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2073.953624] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2073.964960] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2073.972210] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2073.998908] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2074.009001] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2074.017074] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2074.024143] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2074.070023] device bridge_slave_1 left promiscuous mode [ 2074.078645] bridge0: port 2(bridge_slave_1) entered disabled state [ 2074.109797] device bridge_slave_0 left promiscuous mode [ 2074.119358] bridge0: port 1(bridge_slave_0) entered disabled state [ 2074.785191] Bluetooth: hci5: command 0x040f tx timeout 07:24:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) r0 = syz_mount_image$minix(&(0x7f0000000380), &(0x7f0000000480)='./file0\x00', 0x2, 0x3, &(0x7f00000006c0)=[{&(0x7f00000004c0)="e3bdc71fa912385119948cafcf3f353704eb93856e64c7056d32b8", 0x1b}, {&(0x7f0000000500)="021d1c51650dd5a1eae0e44f1cad4d381b88e4fdc36b82434c78b46810aa338e649d84529c", 0x25, 0x1}, {&(0x7f00000005c0)="a284bfd0490824f3d37d685c59fef064951ea0286de377e5ab7e2ba58c836e63feab2d3499440d41ccf774ab0ed21e51f3d634923d552cec1b6494f6a1a3d17f1b871c4ff6ca2681507c185478703dcf7a404bd7de2d7005d15341b0529ff27d6d3b4f9601336fb0800b9d5372cc6a45290afc5eba6997fe84ca88c981f59b209cfae4b1265e3468ce2954f1663fb7ee757d1927352b0030709e6104f1d76a0650dfab3b443eee86d85bbdc8347ae9b078fa601f5a0171aea6cd6a757cbca7457ffac01a0451084f8bfb0ce905c57acf86b734", 0xd3, 0x7f}], 0x2000080, &(0x7f0000000540)=ANY=[@ANYBLOB="2a2b5c2c6fe26a5f726f6c653d2c1d"]) socket$inet6(0xa, 0x4, 0x80) name_to_handle_at(r0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000440), 0x1400) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0xa00, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f00000003c0)={0x6c7}) getpeername$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000200)=0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x110002, 0x4, @perf_bp={&(0x7f0000000740)}, 0x0, 0x0, 0x0, 0x0, 0x83fd, 0xffffffff}, 0xffffffffffffffff, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00'}) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYRES32=r1], 0x0, &(0x7f0000000240)='ext2\x00', 0x20000, &(0x7f0000000780)='\x00\xa7t\x1b\xbc:\x88\xc2\x11\xebt\xe6\xe8\xec\xea\x8c.\x91^\x00\xe6-\x16\x04\x9ce\x7f\xa6J\xd9\xd7%Z\x8c\x9d\xfd\xfc\xa5\xb6\x05)\xb6`\xa7\xcd]\xa2LF\xee\xf6\xbe\n\xe5\xd3\x1b+5\x06Uh\x12\xc2\xda\x18\xb3\xd0\x19\x91\x9fs\"\xd5\x81\xff\x96o;\xaf\xa6\a\x8b\'\xdb\xc8\xfcd.\xfag\xe2\xdc\xc0\xc0\x1a\xc3\x80\xa2\xb1\xaaQ\xb7\xfc\xf4R\x11r\xb6\x89\xc1d\x88{@\x1f\xbd\x97j;7\xf2\xa4\xec\x84j\xa8\xfb\xa0\x89\x82\xa3\xd3\xe7\xa5|\x8eG') 07:24:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() msgsnd(r2, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r4 = fcntl$dupfd(r1, 0x0, r1) recvfrom$inet6(r4, &(0x7f0000000340)=""/97, 0x61, 0x1, 0x0, 0x0) r5 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r6, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r5}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:42 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000100)={@random="7b14bdec08db", @empty, @val, {@ipv6}}, 0x0) 07:24:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x8000000000007, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc000) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x34000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:42 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) poll(&(0x7f0000000080)=[{r0, 0x1}, {r0}], 0x2, 0x0) [ 2075.041133] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2075.112962] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:42 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[], 0xa, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000140)="6a9124e975923ff80920fd781a0e4c9f4f7a40cdaffd4e607bac5782363b56162704dd16a514266ba3af867e0bc4534de7a8de4b380f87cc183deb2f3966988292d7a7b38ec1c04f412611dfb2606416d308179eb3035ed70a4d07b896e645192beb2148df6b30f923d4a4ca01455df5ef4784d4cd97b38e930494914db53c9ce7e2ac1943cc06b33cbe35ee172160f0c9", 0x91}], 0x2}, 0x0) 07:24:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc100) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:42 executing program 2: clock_settime(0xffffffffffffffff, &(0x7f0000000040)) 07:24:42 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x10200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:24:42 executing program 2: socket$inet6(0x18, 0x3, 0xff) [ 2075.497585] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2075.540344] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2075.649404] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2075.863976] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="203fb4a40083293b780500001f000000a600000001000000"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x9000, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x5}}]}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00'}) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x38c5}}], 0xc6, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r0, @ANYRESDEC=r3, @ANYBLOB="2557ba10187a4382c07bd728e15b2840ee6810b0df713dde5a7f49069e4a87d0d3e879bba5cb40b48e7ec42d4e2ed46aa17be168cfd52b07d2255926895140597c3c462a8e6c09c4045bf97119747427cf4f9d261ceb8a20ebc772c2abc3ad631b7f63"], 0x20}}, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) 07:24:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x2) msgget$private(0x0, 0x2) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000001c0)=[r2, r2, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) syz_open_procfs$namespace(r3, &(0x7f0000000040)='ns/time\x00') sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100919e7d8c0c8bbe5c70656469740040aa540e0280500e02bfb8f284ad00000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000008b8afddf4efeeea640080000000000000000f5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000077bda03622d909ab00000000000000000093210000000000000000000000000000000000000000000000000000000000000000e3c24b342afa6dffffe500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff0000000000000000000000000000000000000000000000000000000000915c9d0410000000000000000000000600000000000000000000000000000000000000000000000000000000fc94eeb568fb6898ce671f266acde194b230d371d087831026c773f24b70adc6394b81c5958a5ffbc303a5f2fe6948996e9e8f663034d4fb2141dfa39706c547322cbc0aaf02933a0cc9c5144a3b5d8169c0e573fafd909f4b661cbc6efb5b"], 0xe98}}, 0x0) [ 2076.027961] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2076.040218] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc200) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x1}, [{0x2, 0x5}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x6}, {0x2, 0x6}, {0x2, 0x2}, {0x2, 0x4, 0xee01}, {0x2, 0x5, 0xffffffffffffffff}], {0x4, 0x2}, [{0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x2}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x6}], {0x10, 0x3}}, 0x9c, 0x3) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0x1, 0x0, r2, 0xffffffffffffffff, 0x0, 0x40, 0xfffb}, 0x0, 0x0, 0x1, 0x80000001, 0x101, 0x4, 0x3, 0x4, 0xffff, 0x6}) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) r4 = getgid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0xc88}, 0x40) [ 2076.188331] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2076.224025] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:43 executing program 3: sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000100), 0x4) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000b00)={0x3b, 0xe4, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="20000000e93f71925cbdeb84a264e1437911b9b3", @ANYRES32=r3], 0x20}}, 0x0) r4 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/card1/oss_mixer\x00', 0x80, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r4, 0xf501, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002740)={'ip6gre0\x00', &(0x7f00000026c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev, 0x7800, 0x1}}) 07:24:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc300) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2076.585160] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2076.593556] netlink: 3712 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2076.625149] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2076.652230] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:24:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) 07:24:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff80000000000003, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2076.750206] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf0ffff, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc400) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2077.049246] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2077.076660] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc500) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:44 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@v, @t={0x81, 0x1, 0x0, 0x0, @generic=0x2}], 0x10) [ 2077.276657] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2077.295334] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:24:44 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@v, @t={0x81, 0x1, 0x0, 0x0, @generic=0x2}], 0x10) [ 2077.377273] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f00000005c0)="03d4654627b29cf9e6deb2ee574f90fcb3d065c30a9e64dfd6ca772a920b71bab211ddba41f5beaaba7ef55f1a9e139dda7600fb11124323a67f000f2fde232c4f9c6c12e40e451754467d8d58f184d42bc938a01bde2bc7f1ca9242cb7c5d871ae698087c32db184c6c46750d4fbd33db3d1487576a5bab6e706eebd928dd9a6a497280", 0x84, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() msgsnd(r1, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) msgget$private(0x0, 0x14) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e02000000000000000000000000000000000000000000970000000000000000000047746429a0ced00137de6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000030000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2077.448304] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x1000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2077.594807] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2077.741590] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2077.778681] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2079.199199] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2079.207734] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2079.216111] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2079.223242] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2079.233448] device veth1_macvtap left promiscuous mode [ 2079.239825] device veth0_macvtap left promiscuous mode [ 2079.245519] device veth1_vlan left promiscuous mode [ 2079.250636] device veth0_vlan left promiscuous mode [ 2082.704088] Bluetooth: hci5: command 0x0409 tx timeout [ 2083.571303] device hsr_slave_1 left promiscuous mode [ 2083.578751] device hsr_slave_0 left promiscuous mode [ 2083.597706] team0 (unregistering): Port device team_slave_1 removed [ 2083.608161] team0 (unregistering): Port device team_slave_0 removed [ 2083.621206] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2083.632179] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2083.666147] bond0 (unregistering): Released all slaves [ 2083.680319] IPVS: ftp: loaded support on port[0] = 21 [ 2083.789415] chnl_net:caif_netlink_parms(): no params data found [ 2083.898743] bridge0: port 1(bridge_slave_0) entered blocking state [ 2083.907255] bridge0: port 1(bridge_slave_0) entered disabled state [ 2083.920074] device bridge_slave_0 entered promiscuous mode [ 2083.930030] bridge0: port 2(bridge_slave_1) entered blocking state [ 2083.941289] bridge0: port 2(bridge_slave_1) entered disabled state [ 2083.951531] device bridge_slave_1 entered promiscuous mode [ 2083.991356] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2084.008099] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2084.045953] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2084.058911] team0: Port device team_slave_0 added [ 2084.067340] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2084.080943] team0: Port device team_slave_1 added [ 2084.113509] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2084.125443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2084.160120] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2084.175617] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2084.181880] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2084.212642] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2084.232110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2084.240997] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2084.282749] device hsr_slave_0 entered promiscuous mode [ 2084.294473] device hsr_slave_1 entered promiscuous mode [ 2084.300846] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2084.317680] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2084.424294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2084.430732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2084.437481] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.443869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2084.512180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2084.522514] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2084.536194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2084.543325] bridge0: port 1(bridge_slave_0) entered disabled state [ 2084.550767] bridge0: port 2(bridge_slave_1) entered disabled state [ 2084.565579] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2084.571668] 8021q: adding VLAN 0 to HW filter on device team0 [ 2084.585468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2084.593170] bridge0: port 1(bridge_slave_0) entered blocking state [ 2084.599581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2084.625129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2084.632739] bridge0: port 2(bridge_slave_1) entered blocking state [ 2084.639114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2084.647671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2084.656919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2084.665163] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2084.681183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2084.693600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2084.701397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2084.712343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2084.724482] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2084.730561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2084.750958] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2084.759374] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2084.767166] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2084.774127] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2084.783996] Bluetooth: hci5: command 0x041b tx timeout [ 2084.790908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2084.819581] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2084.832384] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2084.848428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2084.858819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2084.904798] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2084.912120] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2084.920762] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2084.936146] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2084.943019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2084.951450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2084.960376] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2084.968298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2084.978501] device veth0_vlan entered promiscuous mode [ 2084.991112] device veth1_vlan entered promiscuous mode [ 2084.997666] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2085.007744] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2085.022453] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2085.032976] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2085.040779] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2085.049227] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2085.057125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2085.065873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2085.078204] device veth0_macvtap entered promiscuous mode [ 2085.085713] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2085.095153] device veth1_macvtap entered promiscuous mode [ 2085.101322] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2085.112204] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2085.125998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2085.137578] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2085.148724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.158450] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2085.168939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.178605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2085.188863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.198183] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2085.208073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.217330] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2085.227532] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.238109] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2085.247743] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2085.256687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2085.266592] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.275949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2085.285805] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.295100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2085.305051] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.314324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2085.324142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.333348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2085.343195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2085.355409] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2085.362371] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2085.370863] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2085.378543] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2085.386085] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2085.395386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2085.403437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2085.411788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2085.534505] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2085.540813] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2085.566010] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2085.566477] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2085.579586] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2085.589826] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2085.598834] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2085.606196] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 07:24:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() r4 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x800) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x8, 0x0) msgsnd(0x0, &(0x7f00000004c0)={0x3, "186608c6888069ec36d82e9941adb6d6db51c57289c2b260523dd51ff334f4d52e7cacc249311c6273ca6ca8bb4cbba2f837c246443ce650e1b7eb3a3925a5005eef06a96c4e1933b74b79ffd023f4e4f3d0ad59136b0821134778dd28bc3ca36abae925cc22072d89962eb64239c3f9236336863b487fc8efa67f0afbb5673f4f66b7d4c0202fabee8a5f68fe1315f5be1919ab4fff91bd7d59dcabb29a87725be416fa0e6f20ccb5d869513293ae595319b293b76bed7c94af4bb5cd2bb1306fcaee9724f3b13befcf713e57ec7eb2579b9007b2809057cd76225f3111125f61ac5e5c9d912921d2d9212aac6824f4"}, 0xf8, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x4040880) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:52 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@v, @t={0x81, 0x1, 0x0, 0x0, @generic=0x2}], 0x10) 07:24:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc600) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:52 executing program 4: socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) r0 = msgget$private(0x0, 0x20) msgrcv(r0, &(0x7f0000000340)={0x0, ""/72}, 0x50, 0x2, 0x2800) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, 0x0, 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() msgsnd(r2, &(0x7f00000004c0)={0x0, "37e224571e99f4a3f34c4b87dbe4aa97f0f5d5389c77fa6cecedf21a558088a3ef79fab72067e33c7931360aab488cd0c7930c043abb204119e819a689d459a74aab28c37dd56140c26dd3aa110dca3a33004cb8f0f1d20224161233f354132c6403c11e1632ba4cf0b9f5c161b430166d49a0d4e6327016aa20f4dd67b7e26f76a64d4d46baddd92605c096617fdd92136385e6b1bd0aecbde6fc20f9442d2235bb831ff20706a65e51e0e30655a39a2f34c6b8d1cda9225f2a818ba6a3bdfc1a3e25d4a03808980313"}, 0xd2, 0x800) r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x2000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2085.717870] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2085.748997] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:52 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@v, @t={0x81, 0x1, 0x0, 0x0, @generic=0x2}], 0x10) [ 2085.776336] nla_parse: 2 callbacks suppressed [ 2085.776358] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2085.826217] device bridge_slave_1 left promiscuous mode [ 2085.860833] bridge0: port 2(bridge_slave_1) entered disabled state 07:24:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 07:24:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc700) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:53 executing program 4: socket$inet(0x2, 0xa, 0xc8) 07:24:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000600)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f00000001c0)="0200000000e9efb24cbbe6d6da3be8868b7525000419000f000300040003000000000000000f002e690000000000", 0x2e, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() wait4(0x0, &(0x7f0000000040), 0x2, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000004c0)={{0x2, 0xffffffffffffffff, r2, 0xee00, r2, 0x40, 0x396c}, 0x0, 0x0, 0x10, 0x9, 0x4, 0x8, 0x0, 0x6, 0x8}) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000003a0000022bbd7000fbdbdf250a080000a287e102e2c0c561d5380e8f3e679a0e587b0a50c34c2389077eb5460551b35fcbec1d7b6abf6bdfc87242fe102e9b42b2aa595135acdbcff283038efc95d90e70844751a9e584b9bf5885775b001ed9c4d995714823891c225e5b3784fa3604feac2c7141f487a5866d94dc4565764d27a51d7cad19"], 0x14}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000800) [ 2085.942072] device bridge_slave_0 left promiscuous mode [ 2085.961929] bridge0: port 1(bridge_slave_0) entered disabled state 07:24:53 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000003200)) 07:24:53 executing program 2: capget(0x0, &(0x7f0000000080)) [ 2086.151282] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2086.583931] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2086.796979] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2086.806022] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000200)) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="203dd4305600010000000000000000a100000000", @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:53 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001280)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0}, 0x68) 07:24:53 executing program 2: r0 = eventfd2(0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000023c0)='ext3\x00', 0x0, 0xfffffffffffffffd, 0x5, &(0x7f0000002740)=[{&(0x7f0000002440)="e38fe3b778f98f3cd38aaa0fbadb11c0b3271fe271d565a8d12cd7b4774329596927aca075", 0x25, 0x7}, {&(0x7f0000002500), 0x0, 0x3f}, {0x0}, {&(0x7f0000002640), 0x0, 0x5}, {&(0x7f00000026c0)="ed3fb1547521152acf048fd87d3ffeddb67c88bd69652a14331890a91683165d7941a52b616c901017786dd191545ede6c1b0dc1525cae8d2bfe2ece39e3c647f523495aa2447ce308fa6d692c", 0x4d, 0x1}], 0x210000, &(0x7f0000002800)={[{@noload}, {@nogrpid}, {@barrier_val}, {@data_err_abort}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) 07:24:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc800) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x3000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2086.863897] Bluetooth: hci5: command 0x040f tx timeout [ 2086.899699] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:54 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, 0x0) [ 2086.931409] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2086.972286] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:54 executing program 2: syz_mount_image$ext4(&(0x7f00000023c0)='ext3\x00', &(0x7f0000002400)='./file0\x00', 0x0, 0x0, &(0x7f0000002740), 0x0, &(0x7f0000002800)={[{@init_itable}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}]}) 07:24:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f0000000200)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0xb, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @broadcast}]}]}, 0x70}, 0x1, 0x400300}, 0x0) 07:24:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xc900) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2087.169212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2087.194239] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2087.205524] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 07:24:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/18) [ 2087.276002] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 07:24:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000013c0)=[{&(0x7f0000000080)="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", 0x1bb}], 0x1) [ 2087.413877] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2087.429833] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000002c0)={{0x4, 0x4}, 0x100, './file0\x00'}) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x200000004}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:24:54 executing program 2: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, 0x0) syz_mount_image$ext4(&(0x7f00000023c0)='ext3\x00', &(0x7f0000002400)='./file0\x00', 0x0, 0x1, &(0x7f0000002740)=[{&(0x7f0000002500)}], 0x210000, &(0x7f0000002800)) mount$9p_fd(0x0, 0x0, &(0x7f0000002380), 0xcc000, &(0x7f00000028c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_none}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) [ 2087.517396] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2087.527569] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:24:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffdfffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2087.564273] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 2087.574221] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:54 executing program 4: pipe2$9p(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000ac0)={0x7}, 0x20000ac7) 07:24:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x4000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:54 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x230c40, 0x0) 07:24:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xca00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:54 executing program 2: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000003880), 0xffffffffffffffff) write$sysctl(0xffffffffffffffff, 0x0, 0x0) [ 2087.816028] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:24:54 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_service_time\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x83fd, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x58, r4, 0xec9bdbcf66659bc5, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}]}, 0x58}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)={0x90, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xef9}, {0x6, 0x16, 0x6}, {0x5}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x16, 0x7}, {0x5}}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@sg0, 0x0, &(0x7f0000000240)='ubifs\x00', 0x2202000, &(0x7f0000000280)='\x00') [ 2087.864949] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:55 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001300)='ns/pid_for_children\x00') ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, 0x0) 07:24:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xcb00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:55 executing program 2: getresuid(&(0x7f0000000b40), 0x0, 0x0) 07:24:55 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480), 0x88000, 0x0) fcntl$setflags(r0, 0x2, 0x0) [ 2088.232872] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:24:55 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$FIBMAP(r0, 0x5452, 0x0) [ 2088.619346] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2088.746111] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2088.762454] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:24:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xcc00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:24:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x5000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:55 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000001100), 0xffffffffffffffff) 07:24:55 executing program 4: semop(0x0, &(0x7f0000000280)=[{0x0, 0x40, 0x1000}, {}], 0x2) 07:24:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x92) r2 = msgget$private(0x0, 0x422) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000040), 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=@ipv4_getnetconf={0x54, 0x52, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NETCONFA_RP_FILTER={0x8, 0x3, 0x20}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x51}, @NETCONFA_FORWARDING={0x8, 0x2, 0x6}, @NETCONFA_FORWARDING={0x8, 0x2, 0x17b}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fffffff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_IFINDEX={0x8, 0x1, r3}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x20}]}, 0x54}, 0x1, 0x0, 0x0, 0x4800}, 0x40000c5) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r4 = getgid() ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vxcan0\x00'}) r5 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r4, 0x0, r4]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r6, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r5}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:24:56 executing program 4: getresgid(&(0x7f0000008440), 0x0, 0x0) [ 2088.906055] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2088.912067] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2089.305054] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2090.948129] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2090.955242] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2090.962902] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2090.970858] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2090.983074] device veth1_macvtap left promiscuous mode [ 2090.988894] device veth0_macvtap left promiscuous mode [ 2090.994435] device veth1_vlan left promiscuous mode [ 2090.999567] device veth0_vlan left promiscuous mode [ 2094.063110] Bluetooth: hci5: command 0x0409 tx timeout [ 2095.276719] device hsr_slave_1 left promiscuous mode [ 2095.286904] device hsr_slave_0 left promiscuous mode [ 2095.301659] team0 (unregistering): Port device team_slave_1 removed [ 2095.315004] team0 (unregistering): Port device team_slave_0 removed [ 2095.326975] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2095.337256] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2095.368533] bond0 (unregistering): Released all slaves [ 2095.386002] IPVS: ftp: loaded support on port[0] = 21 [ 2095.512434] chnl_net:caif_netlink_parms(): no params data found [ 2095.628434] bridge0: port 1(bridge_slave_0) entered blocking state [ 2095.636971] bridge0: port 1(bridge_slave_0) entered disabled state [ 2095.648653] device bridge_slave_0 entered promiscuous mode [ 2095.659391] bridge0: port 2(bridge_slave_1) entered blocking state [ 2095.671303] bridge0: port 2(bridge_slave_1) entered disabled state [ 2095.682001] device bridge_slave_1 entered promiscuous mode [ 2095.713656] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2095.725011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2095.748905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2095.757407] team0: Port device team_slave_0 added [ 2095.764289] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2095.772184] team0: Port device team_slave_1 added [ 2095.796750] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2095.803395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2095.829785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2095.843203] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2095.849628] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2095.876307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2095.889497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2095.899962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2095.927668] device hsr_slave_0 entered promiscuous mode [ 2095.934011] device hsr_slave_1 entered promiscuous mode [ 2095.940279] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2095.949395] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2096.050331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2096.056763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2096.063475] bridge0: port 1(bridge_slave_0) entered blocking state [ 2096.069834] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2096.125779] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2096.136967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2096.143872] Bluetooth: hci5: command 0x041b tx timeout [ 2096.157287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2096.166087] bridge0: port 1(bridge_slave_0) entered disabled state [ 2096.174664] bridge0: port 2(bridge_slave_1) entered disabled state [ 2096.188865] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2096.196133] 8021q: adding VLAN 0 to HW filter on device team0 [ 2096.214699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2096.222422] bridge0: port 1(bridge_slave_0) entered blocking state [ 2096.228851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2096.247348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2096.255437] bridge0: port 2(bridge_slave_1) entered blocking state [ 2096.261790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2096.285556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2096.295254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2096.315432] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2096.325538] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2096.336838] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2096.345351] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2096.352650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2096.361562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2096.369817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2096.389089] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2096.409323] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2096.419935] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2096.427935] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2096.446094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2096.470300] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2096.487705] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2096.499820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2096.511675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2096.586165] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2096.594263] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2096.600989] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2096.620030] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2096.630193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2096.647348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2096.661742] device veth0_vlan entered promiscuous mode [ 2096.671253] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2096.679632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2096.690470] device veth1_vlan entered promiscuous mode [ 2096.700008] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2096.710138] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2096.723924] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2096.734118] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2096.741064] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2096.749328] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2096.757951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2096.766027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2096.776917] device veth0_macvtap entered promiscuous mode [ 2096.784090] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2096.795175] device veth1_macvtap entered promiscuous mode [ 2096.802027] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2096.811113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2096.825982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2096.835537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2096.845342] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2096.854840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2096.864655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2096.873868] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2096.883907] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2096.893279] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2096.903053] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2096.912174] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2096.923399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2096.934130] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2096.941126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2096.949968] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2096.957469] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2096.965054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2096.973049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2096.982330] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2096.992161] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2097.001444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2097.012055] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2097.025379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2097.035962] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2097.045834] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2097.056377] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2097.066022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2097.076486] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2097.087066] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2097.094716] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2097.102371] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2097.111043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2097.224145] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2097.233727] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2097.240868] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2097.259145] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2097.292351] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2097.298940] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2097.307371] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2097.315060] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2097.359808] device bridge_slave_1 left promiscuous mode [ 2097.366210] bridge0: port 2(bridge_slave_1) entered disabled state [ 2097.374048] device bridge_slave_0 left promiscuous mode [ 2097.379927] bridge0: port 1(bridge_slave_0) entered disabled state 07:25:04 executing program 4: getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 07:25:04 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000002380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003680)) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003880)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mount$9p_fd(0x0, &(0x7f0000003ac0)='./file0\x00', 0x0, 0x0, &(0x7f0000004c80)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid}]}}) openat$pidfd(0xffffffffffffff9c, &(0x7f0000004dc0), 0x2, 0x0) 07:25:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xcd00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x6000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200001eae1010000043b78050a001f000000a600000007000000aadede5800000000"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r1], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd(r0, &(0x7f0000000040)={[0x800]}, 0x8) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@deltfilter={0x3c, 0x2d, 0x100, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0xd}, {0xfff3, 0x10}, {0xfff2, 0xffe0}}, [@TCA_RATE={0x6, 0x5, {0x7f, 0x6}}, @TCA_CHAIN={0x8, 0xb, 0x58}, @TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:04 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000004dc0), 0x0, 0x0) [ 2097.718204] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2097.734627] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:04 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 07:25:04 executing program 4: add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000180)="50a4669ac1585b40b48fe3001ff81a4e05d005c2030eda931fd95f64989405311f005b3b2cae760fb445dfc92fbbea0da12361d8a52e7a0192e1f62a3d2ffb9b44b80929bf7a51f433fa9474934d1e4ca093e14fc9ea14b96e30ddaceb2b03726c5110ceedd2173e6cff2a3630578be81ad3eb9804a400", 0x77, 0xfffffffffffffffd) 07:25:04 executing program 2: syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x381000) 07:25:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xce00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2097.945037] Option 'aØ¥.z’áö*' to dns_resolver key: bad/missing value [ 2097.974875] Option 'aØ¥.z’áö*' to dns_resolver key: bad/missing value 07:25:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001740)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000001340)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@flowinfo={{0x14, 0x29, 0xb, 0x1000}}], 0x18}}], 0x2, 0x0) 07:25:05 executing program 2: timer_create(0x7, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_gettime(0x0, 0x0) 07:25:05 executing program 4: timer_create(0x4, 0x0, 0x0) [ 2098.108131] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:05 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_gettime(0x0, &(0x7f0000000140)) [ 2098.189469] nla_parse: 4 callbacks suppressed [ 2098.189565] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2098.228423] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2098.294548] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x7000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="2f64657624ace8abc7e00eb392f5002f6e62643000"], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') r3 = syz_mount_image$nilfs2(&(0x7f0000000200), &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="e4eb841afb9c8e46563df0c4cd32c7ede66f3b6535", 0x15, 0x40}, {&(0x7f0000000340)="aaa5008e8213448af97b80583c020276274c18cc589f88ea1395e9389d7cc9f57a", 0x21, 0x3ff}, {&(0x7f0000000380)="b9e955b7bb86345c09979daab2472c97402740157b2626e3eab434e1fd640b9cbf23d8153053e2fbe8150ea74aa352aff52cc73c627675ddf798f41c7c893f9b2aea938418e3a240a4", 0x49, 0x5}], 0x4, &(0x7f0000000500)={[{@norecovery}, {@discard}, {@order_strict}], [{@appraise}, {@appraise_type}, {@dont_measure}]}) pwritev(r3, &(0x7f00000009c0)=[{&(0x7f00000005c0)="9946bbe41ff7ea14c6c2c6e82fc533a6f2a111add2b06b71e069ed13878e5bf23beb149a1716ab740a1be20eec7c08db3a7aaa39b64047569ef4020396ff21e5bd22e6ec880033ffff38b269c1a01e2c26013fa93022", 0x56}, {&(0x7f0000000640)="a6220fde52967547d754791a4150bf4b3ca5ed4884bdbe77b36954b375eccc7e624b399c2497a41bb832aea23917ae65e4dbdffd1084ba65217082aa6ac2d5ddc9430c83c2", 0x45}, {&(0x7f00000006c0)="a52e62a8fe01f371fdc24df03194f52f7d8825dd074214517e3d5f9a1005f7a19725899e4346ac8fc7ce13d0dfbcc2291f3150da0f53b7206101deb3e357c835536c7bf760418fc6f2be1c5dd07f2fd1fd3d7878414c5fcd20e39ddbec384de9ba8b41fd85f171d398050d9f21bc2cd6877974312915097e5b5615ceb575388276a3b446ed81e0d4c934c6f685b0cdbc93715b56b218952e91752994c17b6d44c525d6d9df4f6f539b471844e18c6ac02874", 0xb2}, {&(0x7f0000000780)="1211378173e495b4aa9785edef25f6aab091b82eb0644003464b3198f66d02ed8777aa5aee4d39b1ecbd7e47801abdd6a826b4b6102e791aab68723aa724f714ffabcca8686c94f024dbb8f9648ac6389f3100871660f94fd7bb8437c02aff3644573062c28f80b71e7a656ae3bd4263a3248223b1dc8144b6058623aa691398bec705cbcad08af82cd48f82beba3aeea43defbdddcbd42e2a", 0x99}, {&(0x7f0000000840)="5987216da9fb781ba979a2922d89c76ea8efbfa5d88c870d355fc301d022021e9c89a60922b194acae3661811da541e52fc31884d90a354697b98c44926cd076931f3e8688abcb684e4da999c6548596cf3520cac5", 0x55}, {&(0x7f00000008c0)}, {&(0x7f0000000900)="dc64bbf4db452afc7876f3fb8c9cf087683826b17c0c938d47aed8d3fe69a2a9c95a9d38969ac2d6611c90faa64238f29cf6813746330e84ad6192938c68dac9418d26382980375b052c471bb7b9a62d9aff688b", 0x54}, {&(0x7f0000000980)="242a13fee47f12290cb31c4addf7a395add587e5d82297f4b390c51e92d8b0da6c50f69093d6500b143e76952ecebf97", 0x30}], 0x8, 0x1f, 0xd5) 07:25:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:05 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0)) 07:25:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x90) 07:25:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xcf00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2098.544500] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:05 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) [ 2098.617869] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:05 executing program 4: process_vm_writev(0x0, &(0x7f0000002480)=[{&(0x7f0000002180)=""/111, 0x6f}, {0x0}], 0x2, &(0x7f0000002540)=[{&(0x7f0000002500)=""/58, 0x3a}], 0x1, 0x0) 07:25:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd000) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) [ 2098.896957] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:06 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) 07:25:06 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00', 0x4e}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r1, 0x5501) [ 2099.171077] input: syz0 as /devices/virtual/input/input15 [ 2099.417406] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2099.498883] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2099.531853] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2099.548307] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:25:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x8000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2099.680675] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2099.915407] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2099.936375] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2100.065072] ieee802154 phy0 wpan0: encryption failed: -22 [ 2100.070706] ieee802154 phy1 wpan1: encryption failed: -22 [ 2101.571738] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2101.578551] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2101.589435] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2101.596664] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2101.609128] device veth1_macvtap left promiscuous mode [ 2101.614987] device veth0_macvtap left promiscuous mode [ 2101.620424] device veth1_vlan left promiscuous mode [ 2101.626699] device veth0_vlan left promiscuous mode [ 2104.542153] Bluetooth: hci5: command 0x0409 tx timeout [ 2105.915123] device hsr_slave_1 left promiscuous mode [ 2105.923111] device hsr_slave_0 left promiscuous mode [ 2105.939821] team0 (unregistering): Port device team_slave_1 removed [ 2105.951246] team0 (unregistering): Port device team_slave_0 removed [ 2105.961433] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2105.975394] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2106.007478] bond0 (unregistering): Released all slaves [ 2106.028197] IPVS: ftp: loaded support on port[0] = 21 [ 2106.135059] chnl_net:caif_netlink_parms(): no params data found [ 2106.258982] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.266036] bridge0: port 1(bridge_slave_0) entered disabled state [ 2106.278399] device bridge_slave_0 entered promiscuous mode [ 2106.288895] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.300206] bridge0: port 2(bridge_slave_1) entered disabled state [ 2106.310650] device bridge_slave_1 entered promiscuous mode [ 2106.345084] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2106.355357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2106.380559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2106.389173] team0: Port device team_slave_0 added [ 2106.395907] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2106.404475] team0: Port device team_slave_1 added [ 2106.427756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2106.434623] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2106.462022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2106.475447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2106.482272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2106.507859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2106.520315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2106.528798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2106.558948] device hsr_slave_0 entered promiscuous mode [ 2106.565535] device hsr_slave_1 entered promiscuous mode [ 2106.572432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2106.579957] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2106.623192] Bluetooth: hci5: command 0x041b tx timeout [ 2106.680996] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.687434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2106.694131] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.700507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2106.771001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2106.786704] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2106.798009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2106.813082] bridge0: port 1(bridge_slave_0) entered disabled state [ 2106.819933] bridge0: port 2(bridge_slave_1) entered disabled state [ 2106.839463] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2106.846152] 8021q: adding VLAN 0 to HW filter on device team0 [ 2106.860899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2106.869769] bridge0: port 1(bridge_slave_0) entered blocking state [ 2106.876205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2106.894201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2106.903056] bridge0: port 2(bridge_slave_1) entered blocking state [ 2106.909429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2106.926735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2106.940758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2106.948847] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2106.964665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2106.980438] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2106.996678] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2107.004401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2107.012121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2107.037876] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2107.056977] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2107.068304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2107.076530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2107.093769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2107.117003] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2107.133408] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2107.140516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2107.154705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2107.213830] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2107.221135] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2107.228496] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2107.242113] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2107.248782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2107.257696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2107.269950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2107.280191] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2107.289788] device veth0_vlan entered promiscuous mode [ 2107.302776] device veth1_vlan entered promiscuous mode [ 2107.308745] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2107.319093] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2107.331692] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2107.342596] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2107.349510] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2107.357171] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2107.366462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2107.374572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2107.385857] device veth0_macvtap entered promiscuous mode [ 2107.392550] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2107.401026] device veth1_macvtap entered promiscuous mode [ 2107.407565] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2107.418639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2107.429229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2107.438787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2107.449057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.458300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2107.469069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.478506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2107.488320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.497529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2107.507604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.516827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2107.526865] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.550955] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2107.559284] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2107.567956] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2107.575826] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2107.583593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2107.591579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2107.603537] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2107.613633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.623897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2107.634430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.644181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2107.654620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.664626] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2107.676423] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.686188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2107.696589] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2107.707318] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2107.715305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2107.722669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2107.730483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2107.867181] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2107.876032] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2107.896147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2107.911234] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2107.918060] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2107.918569] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2107.935725] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2107.946929] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2107.989942] device bridge_slave_1 left promiscuous mode [ 2107.999267] bridge0: port 2(bridge_slave_1) entered disabled state [ 2108.016369] device bridge_slave_0 left promiscuous mode [ 2108.025398] bridge0: port 1(bridge_slave_0) entered disabled state [ 2108.711945] Bluetooth: hci5: command 0x040f tx timeout 07:25:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000100), 0x4) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011000100000000000000000000000000c6dc6e83b801852261fdf83b699aaa36878587a61f3784a44a2a0bc46ccf70c9f971ba27a73bccecb5b17862bf7f151d4446c4733609d26c3cf96c37244a9ce30cc8c03df18b7f7f154f9d8984ac1d29c89752c20e47776c29936726264a758c2a4e75801d43afede94a8b009a3b1243940fae2af13ebca2502c34291337581f01dc14db4be1af5742f15a2f6d39bda269b215a9a18ac19c43902308b6fd9b44afd1ec5dff5a16aa74", @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd100) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:15 executing program 2: request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0) 07:25:15 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00', 0x4e}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r1, 0x5501) 07:25:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000340)={0x2, "47f1a0f2aa4f27ecc9d3b6ff3f5624d31a5f0dc6e110a7cb2bc035bad92465e593278106699d3e4c1c7c3e21368014f8dc41029a1049ea334e13a2b945d2e6e914ac4d532a2d7d283976041d2e2bb308160105b67dbdf96df94a12087375ea22d80ccd7f4c50"}, 0x6e, 0x800) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000100), 0x4) connect(0xffffffffffffffff, &(0x7f00000004c0)=@xdp={0x2c, 0x3, 0x0, 0x1b}, 0x80) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe064}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x49, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYRESDEC], 0xe98}}, 0x0) 07:25:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x9000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:16 executing program 2: syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000580)) [ 2108.951934] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2108.973731] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2108.977497] input: syz0 as /devices/virtual/input/input17 07:25:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f00000004c0)=[{&(0x7f0000010000)="20000c000002000019000000900100000f000000000000000200000006000000000008ba0080000020000012dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f00000000c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f00000001c0)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x601, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24008005}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@gettfilter={0x34, 0x2e, 0x200, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x6}, {0x5, 0x5}, {0xb, 0x6}}, [{0x8, 0xb, 0x4f1}, {0x8, 0xb, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x58d5}, 0x4000) r4 = getpid() getgroups(0x1, &(0x7f0000000040)=[r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:16 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00', 0x4e}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r1, 0x5501) 07:25:16 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x4) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfffffcaa) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) prlimit64(0x0, 0xb, &(0x7f0000000280)={0x10000, 0x5}, 0x0) getpid() syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000001140)="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", 0x2000, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000480)="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", 0x2000, &(0x7f000000ab80)={&(0x7f0000000140)={0x50, 0x0, 0x1, {0x7, 0x22, 0x7f, 0x0, 0x0, 0x1f, 0x9}}, &(0x7f00000000c0)={0x18, 0xfffffffffffffffe, 0x8c}, 0x0, &(0x7f00000002c0)={0x18, 0x0, 0x0, {0x4}}, 0x0, &(0x7f0000000380)={0x28, 0x0, 0x3, {{0x3, 0x9}}}, 0x0, 0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="1c000000000000006469676573745f6e756c6c000000000000002000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000002, 0x0) [ 2109.220045] input: syz0 as /devices/virtual/input/input18 07:25:16 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00', 0x4e}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000400)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r1, 0x5501) 07:25:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd200) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2109.378421] input: syz0 as /devices/virtual/input/input19 [ 2109.411459] audit: type=1326 audit(1635146716.458:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15508 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9ce28eba39 code=0x0 [ 2109.526746] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2109.556693] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:25:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) [ 2109.620751] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2109.671013] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newlink={0x70, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x38, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_IGNORE_DF={0x5}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x24008005}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000900)={&(0x7f00000006c0)={0x218, 0x0, 0x33c, 0x70bd25, 0x25dfdbff, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000800) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea43010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) lsetxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=@md5={0x1, "40ce65de85991c091e666caded902171"}, 0x11, 0x3) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000380)=0x7, 0x4) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xa000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0x2, [{}, {}]}, 0x48) 07:25:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}}}, 0x30) [ 2109.913905] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd300) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000180)={0x7, 0x8}, 0x10) removexattr(&(0x7f00000004c0)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='net/if_inet6\x00') syz_open_procfs(0x0, &(0x7f00000006c0)='mounts\x00') write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000740)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @loopback}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000800)='net/ptype\x00') [ 2110.127578] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2110.212558] audit: type=1326 audit(1635146717.268:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=15508 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f9ce28eba39 code=0x0 07:25:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x1000000, &(0x7f0000000340)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x30]}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@seclabel}]}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) chmod(&(0x7f0000000380)='./file0\x00', 0x10) 07:25:17 executing program 2: r0 = syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xd744, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="90cc56c75f015ef9664b9e0b7ac123f0950bb06e8d3ae2c3d8d296871e60685d445a1a0067b5a6423f7d4f0f674ad961f7c4b0b7e1339f839bc454ab85b5e942f6a7bf0eca117a", 0x47, 0x3ff}, {&(0x7f0000000180)="bacf79c3eabedeb98a93e83d50265bde5d3033778fe806ec7066170920df2fcd54cdc16c4401c8d16de038a99236afb8bb6bee1878c5c10d9c7d18473ff1626dffcd9f3b2061f1626233e15c1df817dbc6ce8a83f489da85523a22fe5d9f3e6c3591da605478a598", 0x68, 0x4}], 0x10000, &(0x7f0000000240)={[{'/dev/infiniband/rdma_cm\x00'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@appraise_type}, {@hash}]}) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 07:25:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd400) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000980)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @local}}}, 0xa0) [ 2110.699684] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2110.755758] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2110.789751] vxfs: WRONG superblock magic 5fc756cc at 1 [ 2110.825777] vxfs: WRONG superblock magic 00000000 at 8 07:25:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xb000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:17 executing program 4: socket$inet6(0xa, 0x2, 0x7) [ 2110.886879] vxfs: can't find superblock. [ 2110.896717] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2110.972337] vxfs: WRONG superblock magic 5fc756cc at 1 [ 2110.986973] vxfs: WRONG superblock magic 00000000 at 8 [ 2111.013833] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2111.018974] vxfs: can't find superblock. [ 2111.369595] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2111.386211] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2111.436774] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2111.729374] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.976186] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2112.985458] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2112.995226] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2113.003183] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2113.013777] device veth1_macvtap left promiscuous mode [ 2113.019084] device veth0_macvtap left promiscuous mode [ 2113.026270] device veth1_vlan left promiscuous mode [ 2113.032485] device veth0_vlan left promiscuous mode [ 2116.061123] Bluetooth: hci5: command 0x0409 tx timeout [ 2117.315922] device hsr_slave_1 left promiscuous mode [ 2117.323717] device hsr_slave_0 left promiscuous mode [ 2117.339445] team0 (unregistering): Port device team_slave_1 removed [ 2117.351950] team0 (unregistering): Port device team_slave_0 removed [ 2117.364282] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2117.375640] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2117.409017] bond0 (unregistering): Released all slaves [ 2117.425691] IPVS: ftp: loaded support on port[0] = 21 [ 2117.537700] chnl_net:caif_netlink_parms(): no params data found [ 2117.657467] bridge0: port 1(bridge_slave_0) entered blocking state [ 2117.667100] bridge0: port 1(bridge_slave_0) entered disabled state [ 2117.678730] device bridge_slave_0 entered promiscuous mode [ 2117.690562] bridge0: port 2(bridge_slave_1) entered blocking state [ 2117.700715] bridge0: port 2(bridge_slave_1) entered disabled state [ 2117.715247] device bridge_slave_1 entered promiscuous mode [ 2117.758016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2117.770431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2117.808128] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2117.818438] team0: Port device team_slave_0 added [ 2117.827682] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2117.839700] team0: Port device team_slave_1 added [ 2117.875818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2117.884950] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2117.917611] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2117.931711] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2117.938511] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2117.964345] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2117.976499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2117.985677] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2118.019524] device hsr_slave_0 entered promiscuous mode [ 2118.025775] device hsr_slave_1 entered promiscuous mode [ 2118.037858] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2118.046371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2118.141071] Bluetooth: hci5: command 0x041b tx timeout [ 2118.176240] bridge0: port 2(bridge_slave_1) entered blocking state [ 2118.182673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2118.189344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2118.195769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2118.246953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2118.256878] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2118.269259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2118.279147] bridge0: port 1(bridge_slave_0) entered disabled state [ 2118.287801] bridge0: port 2(bridge_slave_1) entered disabled state [ 2118.300068] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2118.307069] 8021q: adding VLAN 0 to HW filter on device team0 [ 2118.319585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2118.330326] bridge0: port 1(bridge_slave_0) entered blocking state [ 2118.336839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2118.367128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2118.375182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2118.381584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2118.397034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2118.408451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2118.427366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2118.435145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2118.445013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2118.456813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2118.465097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2118.474494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2118.489443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2118.497631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2118.506393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2118.517022] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2118.530076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2118.556942] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2118.566405] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2118.578807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2118.586070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2118.602368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2118.620878] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2118.639784] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2118.647866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2118.662516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2118.703574] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2118.710680] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2118.718661] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2118.730284] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2118.737133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2118.744903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2118.754554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2118.762889] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2118.771476] device veth0_vlan entered promiscuous mode [ 2118.782917] device veth1_vlan entered promiscuous mode [ 2118.788849] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2118.798941] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2118.812335] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2118.822041] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2118.829588] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2118.837072] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2118.844797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2118.852808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2118.864635] device veth0_macvtap entered promiscuous mode [ 2118.872761] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2118.882100] device veth1_macvtap entered promiscuous mode [ 2118.888303] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2118.901743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2118.911478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2118.920148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2118.930105] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2118.940253] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2118.950377] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2118.959583] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2118.969355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2118.978683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2118.988471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2118.997658] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2119.007430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.017582] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2119.028215] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2119.040097] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2119.048583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2119.056580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2119.069182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2119.080448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2119.090780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.099989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2119.110506] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.119862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2119.129788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.139211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2119.149142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.158419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2119.168278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2119.178662] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2119.186864] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2119.194482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2119.202737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2119.325529] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2119.344961] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.367447] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.379595] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2119.387465] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2119.387960] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2119.400151] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2119.412457] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2119.467547] device bridge_slave_1 left promiscuous mode [ 2119.474032] bridge0: port 2(bridge_slave_1) entered disabled state [ 2119.497865] device bridge_slave_0 left promiscuous mode [ 2119.505123] bridge0: port 1(bridge_slave_0) entered disabled state [ 2120.220904] Bluetooth: hci5: command 0x040f tx timeout 07:25:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000900)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000980)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @local}}}, 0xa0) 07:25:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd500) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:27 executing program 4: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') 07:25:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xc000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="200000ea6101000004ad9e09072d3f5478ea9e001f000000a60000000700000000000000000000c5"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0xea5}, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x7}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:27 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000005c0)='net/if_inet6\x00') syz_open_procfs(0x0, 0x0) 07:25:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x8000000000000014) [ 2120.465310] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2120.486892] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:27 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x62d}) 07:25:27 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000300), 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000900)={0x24, 0x0, &(0x7f0000000840)=[@register_looper, @increfs_done, @free_buffer], 0x1, 0x0, &(0x7f00000008c0)="a0"}) 07:25:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd600) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:27 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f0000000000)) 07:25:27 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/hci\x00') 07:25:27 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 2120.821347] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:27 executing program 4: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 2121.119484] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2121.129386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2121.195053] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xe000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000300)={0x6, 0x117, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) [ 2121.370004] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2121.576131] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2121.591442] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:25:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=@mangle={'mangle\x00', 0x1f, 0x6, 0x440, 0x270, 0x310, 0x270, 0x310, 0x0, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x6, &(0x7f0000000340), {[{{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0xff, 0xff, 'wg2\x00', 'macvlan0\x00', {}, {0xff}, 0x62, 0x2, 0x40}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@addrtype={{0x30}, {0x800, 0x40, 0x1, 0x1}}, @common=@set={{0x40}, {{0xffffffffffffffff, [0x1, 0x0, 0x0, 0x4, 0x2, 0x3], 0x4, 0x2}}}]}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x2, 0x2b6, @rand_addr=0x64010100, 0x4e24}}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x3, 0xd9, @dev={0xac, 0x14, 0x14, 0x2a}, 0x4e23}}}, {{@ip={@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffff, 0xff, 'syzkaller0\x00', 'tunl0\x00', {}, {}, 0x11, 0x0, 0x30}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x9, 0x400, @local, 0x4e22}}}, {{@ip={@private=0xa010100, @private=0xa010102, 0xff, 0xffffff00, 'erspan0\x00', 'xfrm0\x00', {}, {0xff}, 0x0, 0x3, 0x2}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x3f}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4a0) r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:28 executing program 4: wait4(0x0, 0x0, 0x0, &(0x7f0000000000)) 07:25:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6f242de4a0ec24c7a6b73211200000ea6101000004aa69dd74b1964b8d00a6007d000700000000009d01ff7016c80f8100000000"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x24000, &(0x7f0000000280)='\x00') 07:25:28 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x88041) 07:25:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd700) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2121.618310] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:28 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000940), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000e40)={0x44, 0x0, &(0x7f0000000c00)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000d40)="02fa093f"}) [ 2121.738860] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:28 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000940), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 07:25:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:28 executing program 2: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) [ 2121.883760] binder: 16083:16088 ioctl c0306201 0 returned -14 [ 2121.904430] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:29 executing program 4: syz_open_dev$binderN(&(0x7f0000000140), 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000100), 0x0, 0x0) dup2(r1, r0) 07:25:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd800) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000540)='statm\x00') [ 2122.206784] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2122.270740] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.289340] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2122.336890] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000040)=0x4) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() r4 = getpid() getsockname$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000340)=0x10) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xe98}}, 0x0) 07:25:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xd900) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2122.565694] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2122.859412] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2124.248779] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2124.255597] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2124.265271] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2124.272619] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2124.283651] device veth1_macvtap left promiscuous mode [ 2124.288965] device veth0_macvtap left promiscuous mode [ 2124.295027] device veth1_vlan left promiscuous mode [ 2124.300097] device veth0_vlan left promiscuous mode [ 2127.590057] Bluetooth: hci5: command 0x0409 tx timeout [ 2128.622253] device hsr_slave_1 left promiscuous mode [ 2128.630453] device hsr_slave_0 left promiscuous mode [ 2128.648276] team0 (unregistering): Port device team_slave_1 removed [ 2128.657709] team0 (unregistering): Port device team_slave_0 removed [ 2128.669660] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2128.682487] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2128.714002] bond0 (unregistering): Released all slaves [ 2128.730179] IPVS: ftp: loaded support on port[0] = 21 [ 2128.824276] chnl_net:caif_netlink_parms(): no params data found [ 2128.936157] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.950001] bridge0: port 1(bridge_slave_0) entered disabled state [ 2128.957501] device bridge_slave_0 entered promiscuous mode [ 2128.974120] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.985820] bridge0: port 2(bridge_slave_1) entered disabled state [ 2128.996128] device bridge_slave_1 entered promiscuous mode [ 2129.036561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2129.052302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2129.081326] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2129.090521] team0: Port device team_slave_0 added [ 2129.096486] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2129.105109] team0: Port device team_slave_1 added [ 2129.134111] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2129.142332] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2129.175391] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2129.195685] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2129.203753] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2129.234650] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2129.246652] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2129.261031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2129.301844] device hsr_slave_0 entered promiscuous mode [ 2129.307713] device hsr_slave_1 entered promiscuous mode [ 2129.320444] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2129.327971] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2129.479546] bridge0: port 2(bridge_slave_1) entered blocking state [ 2129.485976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2129.492673] bridge0: port 1(bridge_slave_0) entered blocking state [ 2129.499039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2129.573198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2129.587185] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2129.605862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2129.616649] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.627335] bridge0: port 2(bridge_slave_1) entered disabled state [ 2129.639606] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2129.646610] 8021q: adding VLAN 0 to HW filter on device team0 [ 2129.658137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2129.666119] bridge0: port 1(bridge_slave_0) entered blocking state [ 2129.670061] Bluetooth: hci5: command 0x041b tx timeout [ 2129.672576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2129.696648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2129.705614] bridge0: port 2(bridge_slave_1) entered blocking state [ 2129.712046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2129.730496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2129.740682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2129.747658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2129.756267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2129.767414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2129.775130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2129.783633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2129.794079] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2129.805793] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2129.816493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2129.826561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2129.837467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2129.845538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2129.855990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2129.868411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2129.877217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2129.885496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2129.898768] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2129.906497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2129.927096] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2129.935407] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2129.943334] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2129.952159] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2129.964598] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2129.981286] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2129.992760] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2130.000100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2130.008166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2130.039363] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2130.046847] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2130.054580] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2130.067855] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2130.074654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2130.082392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2130.090357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2130.097759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2130.107510] device veth0_vlan entered promiscuous mode [ 2130.118424] device veth1_vlan entered promiscuous mode [ 2130.124817] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2130.134319] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2130.147941] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2130.158095] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2130.165296] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2130.172948] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2130.180758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2130.188491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2130.199018] device veth0_macvtap entered promiscuous mode [ 2130.206178] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2130.215544] device veth1_macvtap entered promiscuous mode [ 2130.222400] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2130.232403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2130.243496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2130.253610] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2130.263528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.273003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2130.282989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.292358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2130.302903] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.312232] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2130.322410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.331725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2130.341633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.351993] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2130.359108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2130.367627] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2130.375315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2130.384482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2130.392796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2130.404561] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2130.414728] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.424555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2130.434864] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.444259] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2130.454258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.463823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2130.473917] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.483697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2130.493572] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2130.506005] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2130.513307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2130.527059] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2130.535628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2130.677073] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2130.690840] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2130.698000] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2130.736275] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2130.749224] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2130.756450] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2130.765918] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2130.774007] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2130.821680] device bridge_slave_1 left promiscuous mode [ 2130.828245] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.848271] device bridge_slave_0 left promiscuous mode [ 2130.854734] bridge0: port 1(bridge_slave_0) entered disabled state 07:25:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000080)) 07:25:38 executing program 2: renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 07:25:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x10000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xda00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) msgrcv(r1, &(0x7f00000004c0)={0x0, ""/230}, 0xee, 0x3, 0x1000) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2131.740014] Bluetooth: hci5: command 0x040f tx timeout 07:25:38 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/ip_vs\x00') 07:25:38 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000940), 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x109000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000e40)={0x114, 0x0, &(0x7f0000000c00)=[@request_death={0x400c630e, 0x2}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000009c0)={@fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x2, 0x0, 0x40}, @flat=@weak_handle={0x77682a85, 0xa}}, &(0x7f0000000a40)={0x0, 0x18, 0x38}}}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000a80)={@fda={0x66646185, 0x5, 0x1, 0x2d}, @flat=@weak_binder={0x77622a85, 0x1, 0x2}, @flat=@binder={0x73622a85, 0x10a, 0x1}}, &(0x7f0000000b00)={0x0, 0x20, 0x38}}}, @acquire_done={0x40106309, 0x3}, @clear_death, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000b40)={@fda={0x66646185, 0x4, 0x0, 0x26}, @fda={0x66646185, 0x8, 0x2, 0x10}, @flat=@binder={0x73622a85, 0x100, 0x3}}, &(0x7f0000000bc0)={0x0, 0x20, 0x40}}, 0x1000}, @free_buffer], 0xd0, 0x0, &(0x7f0000000d40)="02fa093fa9f6d2b5d639cf4efdfb099af84061c6a8b4b7ad7fceb628d537cc939a610e86b36199bb8f53fa8752fb119db219e13b9ff83fcc3a6692b6ad0bd2b846e5c3b761e259223e4029116fe9e27f773f04ed37369f8b72d24e6b6452a5419014b9a5172e1925e98e2058b5c143b021c7d383586a6e17765085112dd9b127fa726cf2610b77ed07eaa0717f655d7cf7f791417dd82eed398e6bc35ff0ba3dff529f504a920714891fe86cda3c586d33b6733c7ee34ffc9e58fbaed02208845981040aa635d296437f5396a6363f26"}) [ 2131.848057] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2131.862956] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x200000, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x58, r1, 0xec9bdbcf66659bc5, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}]}, 0x58}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0xd4, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20008000}, 0x20) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r4], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:39 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000940), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000e40)={0x10, 0x0, &(0x7f0000000c00)=[@request_death], 0x0, 0x0, 0x0}) 07:25:39 executing program 4: syz_mount_image$vxfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 07:25:39 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00'}) 07:25:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xdb00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:39 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8908, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:25:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x2, &(0x7f00000001c0)=@raw=[@map], &(0x7f0000000040)='GPL\x00', 0x2, 0xc5, &(0x7f0000000080)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2132.383425] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.392983] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2132.446363] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x18000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:39 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001340)="99", 0x1}], 0x1}, 0x0) [ 2132.560298] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2132.622768] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b782100001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xdc00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:40 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 07:25:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r3 = getgid() r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRES16=r2, @ANYRES16, @ANYRESDEC=0x0, @ANYRESDEC]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0xffffffffffffffff, r3}, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) [ 2132.909306] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2132.926308] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2132.972719] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:40 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f0000005800)) [ 2133.064464] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x20000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$inet(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8000) r2 = socket$kcm(0x10, 0x804000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="1b0000001a008100a00080ecdb4cb9040a4865160b000000d4126e", 0x1b}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000000)=r0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') r3 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2, 0x42}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 07:25:40 executing program 2: socketpair(0x25, 0x1, 0x3, &(0x7f0000000000)) [ 2133.230118] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:40 executing program 4: socketpair(0x25, 0x0, 0x0, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000007c0), 0x4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001040)='ns/uts\x00') 07:25:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b05d25a80648c6394f90124fc60100002400a000000050382c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001c80)=[{0x0}, {&(0x7f0000000380)}, {0x0}, {&(0x7f0000001900)="bd738022f3ac348b6cb399e64a10b8bc3b7f1a843102d5796db8f3d64e128eed13069f4cc1dbd9bd45e2415f9eef359cd39d89eca8931792030f6683d7c61cac57a084b19d916a64b016da7a0cd91c0ae94fd29e218bf2bcb0a2a90d292ba265eeccef89", 0x64}, {0x0}, {0x0}], 0x6, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x168}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b05d25a80648c6394f90224fc60100002400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg(r1, &(0x7f0000002540)={&(0x7f0000001f40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x8001, @dev={0xfe, 0x80, '\x00', 0x2d}, 0xfffffffb}}}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001fc0)="ce8e708985f49a16dba34cf738c76d150a8cf7bdca97507fb4966d99b76151c377eafd0d22c0b995652ac7bd3c1c386c1dc9a16a292de9fe9a04d536c6a55b03d6406874fc0f2a9cc8da7ad5407dc872fe55cc5501248181c917ab9ba9e27ade84dbbb96e446549c10a40b70ffa8d2fbfe99ca98f0651653f02a586597ed2f705afe95f3c50a4b6803fbb3b8835adff20e6f79a2ebce6aa141a5bd06a50050b92460c1f49ed27c058e9100c06f143031ce2a225822", 0xb5}, {&(0x7f0000002080)="ec2cdb2099aa05f1e0b1fb2d280fb0e7bd83968ccb96199cbbb89cb0308a856ca987895d3888aa45f4b43adc2abdbd9385abecc90e3baf52ad54248042502bab44f8a473253a4a6a20135e609bf38a628e5d3ee0575eb4504001d6354998885cf7e9243d7d123693c848aa503b2e56b01529141e7a9702deb70f1372c4db45024b08ed9ef7e8386b39b850c061ea89e4ab1781e35c91f88759d48b4d5edb44551dcaf3af47f71c15ae0738a5da5e1f10a0b35cfa61f69ebe98b0061c922ed6432446068447cf3730d71b9c4dc72038867b52283a14f4769c763351beaff701eb572b78ff", 0xe4}], 0x2, &(0x7f0000002240)=[{0x10, 0x108}, {0xe8, 0x84, 0x8, "2b30a35298d45d8a2664c5c0d89674989e0c6747cce58cf67cf7c55a7da6357d05a83f6997da5848e3a4cd5f7d59f7deab37d968b744b701d4c16e7b296e1137245b1adf0d89b33c2d5a90135f86f8e25980e774b7e7a11503bb1d5c02a80d6bd2cff55912b67d396bbd4b256e88bba6d3c6d52894010be28223bcb4ec00d24144ca36c5ba3c5cb219cd9517cbb604ea2f61e84bbfdb652d6cf6c88b82eb509457cbd62a48c04d9c71575b75ef2bce37b1f4701197c67793c687fec30d17ce5e676711ad0ce88e7ed9bd34564fb9abe701"}, {0x10, 0x10a}, {0x30, 0x0, 0x94, "e0514cce3c4cb61149786a76938962428bd8172fa6fe471822"}, {0xc8, 0x102, 0x0, "766c1554b57f6fa0715b70592f65fdfc1d854411f1e07db12aae1c5eed880414fb3c5c74f9fcb8e64a816f97c04ea4429be6f11d84b94564a088cf17a2196fd0afd0c65280cd54efcaf0b7bc0dfe4b0a28e09158e5554e032598cf1998a21b2adf09f980790bf52026b82201a5b4c0a96653de95765e8e9f248a90378d3d2da1dda659ddb4ede4a130f389393229f63ae874a996d24ef93487dbd55343224655bc0c7e170e5735f3e4326bab2e874934883ab6"}, {0xb8, 0x111, 0x0, "a92ce348598fbcd65644b00afcdd068161dc848d22a8c1e8b61e50ed83bf65edf198ffac2a22b7a026adaac4be1a1d916f69047d4020c846e873fbfff89e248f4171b63e8fd0c24faf319d6d8063da8a1a4c638c22b894d7ddd6c0f44bf36ae72b373fc78588448622fd737c3f8bf6bb6b9a28fc3b976a5514d8fd301cada03b13e778a0250d56e34591dcd93827db7feae5555ca54cbd17da4bfb2547f65ffb7695256271"}], 0x2b8}, 0x4000) socket$kcm(0x29, 0x5, 0x0) 07:25:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xdd00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2133.488544] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2133.593684] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2133.609070] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2133.657617] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2135.393682] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2135.401977] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2135.409921] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2135.417438] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2135.428485] device veth1_macvtap left promiscuous mode [ 2135.434510] device veth0_macvtap left promiscuous mode [ 2135.440066] device veth1_vlan left promiscuous mode [ 2135.445131] device veth0_vlan left promiscuous mode [ 2138.779187] Bluetooth: hci5: command 0x0409 tx timeout [ 2139.784008] device hsr_slave_1 left promiscuous mode [ 2139.792028] device hsr_slave_0 left promiscuous mode [ 2139.807908] team0 (unregistering): Port device team_slave_1 removed [ 2139.821627] team0 (unregistering): Port device team_slave_0 removed [ 2139.834009] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2139.846551] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2139.878203] bond0 (unregistering): Released all slaves [ 2139.893008] IPVS: ftp: loaded support on port[0] = 21 [ 2139.998020] chnl_net:caif_netlink_parms(): no params data found [ 2140.096906] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.103694] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.116316] device bridge_slave_0 entered promiscuous mode [ 2140.124906] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.137824] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.147638] device bridge_slave_1 entered promiscuous mode [ 2140.185449] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2140.201880] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2140.240038] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2140.247696] team0: Port device team_slave_0 added [ 2140.259801] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2140.267647] team0: Port device team_slave_1 added [ 2140.305436] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2140.316966] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2140.348613] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2140.362268] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2140.368650] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2140.402206] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2140.416234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2140.428184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2140.472420] device hsr_slave_0 entered promiscuous mode [ 2140.478568] device hsr_slave_1 entered promiscuous mode [ 2140.489580] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2140.497482] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2140.598717] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.605144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2140.611843] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.618221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2140.691901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2140.705186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2140.719143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2140.732003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2140.742843] bridge0: port 2(bridge_slave_1) entered disabled state [ 2140.760399] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2140.766710] 8021q: adding VLAN 0 to HW filter on device team0 [ 2140.777717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2140.785911] bridge0: port 1(bridge_slave_0) entered blocking state [ 2140.792341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2140.809788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2140.817540] bridge0: port 2(bridge_slave_1) entered blocking state [ 2140.823956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2140.842579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2140.857221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2140.859054] Bluetooth: hci5: command 0x041b tx timeout [ 2140.873913] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2140.884804] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2140.895389] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2140.902957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2140.910703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2140.918562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2140.934548] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2140.941477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2140.950676] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2140.959093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2140.965903] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2140.977652] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2140.997285] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2141.008589] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2141.020097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2141.028206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2141.090269] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2141.097693] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2141.106843] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2141.127873] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2141.134828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2141.145298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2141.156665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2141.165270] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2141.178630] device veth0_vlan entered promiscuous mode [ 2141.192703] device veth1_vlan entered promiscuous mode [ 2141.198564] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2141.208401] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2141.225232] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2141.234453] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2141.242622] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2141.251895] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2141.261868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2141.270610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2141.282314] device veth0_macvtap entered promiscuous mode [ 2141.289607] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2141.298670] device veth1_macvtap entered promiscuous mode [ 2141.305765] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2141.316992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2141.327788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2141.337541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2141.347429] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.356987] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2141.367035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.376526] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2141.386338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.395547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2141.405299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.414536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2141.424425] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.434561] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2141.441936] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2141.449736] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2141.457070] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2141.466087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2141.474621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2141.484989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2141.495235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.504639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2141.514530] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.523867] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2141.533930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.543347] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2141.553228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.562529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2141.572496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2141.583210] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2141.590410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2141.597882] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2141.606096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2141.730892] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2141.737483] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2141.760051] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2141.762374] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2141.775311] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2141.784019] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2141.792137] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2141.799523] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2141.847158] device bridge_slave_1 left promiscuous mode [ 2141.856549] bridge0: port 2(bridge_slave_1) entered disabled state [ 2141.879873] device bridge_slave_0 left promiscuous mode [ 2141.886151] bridge0: port 1(bridge_slave_0) entered disabled state 07:25:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000500a6000000070000000000000000039c00"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:49 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x174401db) 07:25:49 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:25:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xde00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="2f0200002000000004010001020000c20403000007c204000000060401fe0000"], 0x20) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_int(r5, 0x1, 0x29, &(0x7f0000000100), 0x4) sendmmsg(r5, &(0x7f0000001540)=[{{&(0x7f0000000340)=@nfc_llcp={0x27, 0x0, 0x0, 0x3, 0xef, 0x4, "f0b528e60d81e6b0305600d798dd432f819276d44e7d2e94684c9104f082d0279590c7a73aa457b1e8fa9e6a4e2f48f78eff2411d720803326b072435f9734", 0x1e}, 0x80, &(0x7f0000000040)=[{&(0x7f00000004c0)="7927617c8fd441b3bfd7cf77c7091526e8cc65b7a07904ce12ad2676c7fb1b53965f056110bcfb125b9f2c07106bf08a6e9cc6f60c24d1db600f1fd2f3931a26e327acd688c119839e79418bbeeaea7e8313e2a7a9ba9077dff3aafed5ce0d84deeec338860fc371e5e056410b0f6ef06366f19dc8e0a77efb41b8650287485c46e788db85c78b36e6e546", 0x8b}], 0x1}}, {{&(0x7f0000000580)=@l2={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0xffff, 0x2}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000600)="4972389165564fbe91db0693439d78baa7af506ba31e2a6d6d568747765e72992e3343b5b2132ca8eb5363d11fb3f0d050797a2074b2a1d15e14125bc83b2261e3766a8a4946958837b83ba718a637dbbec4c56d80e3a0e7199cae499149df8a5a4276b8ae9cd0a1820e7d1d3bc3e30eea2cbfdfb28a94ae5f5a0ac4ab118f2a5a97e1377f6412251be095418b00d3eac59f58556d8abe21bc1cb640663157560c49a0097035da68631ef053e099cbcbb5e4717110064a29a9790a2d21a33568e4", 0xc1}, {&(0x7f0000000780)="33b0d1bc41afd91d0401c6263e4da211719dc7098dadf0cdc7ab8a364c3b3ab66bedad87fb90cc2c4138f452b5e939050b55fa471ecca2723c3ff67f08a0d97947ca55b0b791d8c945af68c805ccd22b7c9f65e9000e1a05128c490e317fe95039b1da960152b27d5ef67dd71b176730274b5d467a94cc5a198b4dd755412785d3587ebefeb1e6d3fff8216f1832794d15816a863d609e4829fe566832be9c5e4bc31221799071fdc6bfde47d6ec47673b7ec4663249b6b7c29274cb0988960e0ffa8123ad836be1e42c45b5dacdda40cfb3440205b6937e2a4584fe0ed2fae3cf94eb", 0xe3}, {&(0x7f0000000880)="5d69ff3e00cf1d155fc7f23c9a9208dc22be658dbf4192b0ffc5076f0cab3966751c88c0d03c785054fc51cf76c7c86680b47d13219819d267c9f4984a9d924ec6746b41ec15f53626b93a7fcf5531b621440b34e2f22883f6bde3fa1933cd2d9014571c95388a170ec9ddaebcf378983857c48668ceca8d142e716328416fc89a50ecf8d290e82f58e42cbf3d07285a", 0x90}, {&(0x7f00000001c0)}, {&(0x7f0000000940)="e8b9f37c99f932eb369f0856caf0349beee803cb60ad2498d91055df5bd4b96ae251c3dea36540fc6143f4e1e6a2b9fe18822a407c7531807800d7e75b39590c7b1aa1fa7b6727b0b9951bd66bb363c44584a90bc1b1ccdf38c0de341d078d282c45582487643c7bba415eac24622142c2d43f7ac76f7c04d660daeeb2dec85b1294ce0e64c2de1ca085fa5e81489caa6d5290b24f9c1e6b05442b202e18eb2bd45987d36063f591a75ea80cb550fee6387127d453b2b906ba488f2da6c397f85f964096ef14e7", 0xc7}, {&(0x7f0000001640)="0901ded6ff983be7f406c42e23c3acd85bb1b78c847a9cfcfa4179ae6afea251b51958229212f56a843d412ac8e7ed12809f8417bbf3abea456264dff58443e65aeaf9c8d247ee2c039ca54b714ef250fc4306d2fe20c2940112c1b04ac215fcbf22ffbc74ad3001f9cfad8ea0a272a96082681ae1e87321ed7407bc4c9ce80f8c4a88efd6e3b43347fa8219bfec49ce71a8eb9f101d1085", 0x98}, {&(0x7f0000000a80)="ada71b6c9e85cc386db5ee609662fb762f1fcc23e6c4d2d9463998f58716bdc4f2c9b021befed2934050b7d9124496c06f3c3cc7614b96b65edb2ab2da9b8fc49cbf36b57c407e094e400a7b49066e30b1ea7d01d364f2570b32d32a7d36ddd9117424e24ac946d8ada14485ef3462b88ab8056c0a7c63406fca911e93de2c3f77a65aa5926ea6f1ea79dc", 0x8b}, {&(0x7f0000000b40)}], 0x8, &(0x7f0000000c00)=[{0xc0, 0x1, 0x7de21d37, "91269f475afb098c28291066573cbcf0f514a53204619fadd1c0cbef7126104d73cdc5f8af9a5787a565fa483bddd251394f0db83255f7693fed6b9717b18f6ca693b50ebe5d32d389a6f01096df6e8f9e189249d65efc76d0da5d2921f4e47287c8fccbf0f94c11f0753364230633507a24c6798335931d17d6ff04b5d402a3e88b2455f2dc2044a22f78efb93a924ba0b71a4ca7dfa2f9ebc60e7e48ed69612cf9fa544a903efa52aad773630a"}, {0x20, 0x10e, 0x9dac, "a5cc35fe40c1991ad6"}], 0xe0}}, {{&(0x7f0000000d00)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000d80)="f1a1f92d175fe4c278c3e4414ddcba25965478a109376a2a87d949dbe7feefb2e6aa59f81e8436d3e6ed4bbdd03a712a6479e3d62c9faf006e5a0af56c2fb9db079ea1b9e9547770b4d8e2a5812da77054ba592adc0f235179b1f88bcea64417da9cfa0b51d321bbc320203ca6e70234737c11e1f8ac1c67e544c4cb7105646e3502a54addccc1f5b2a647750af461b62b4886e5d988ae99943ce0a2544223fc5db29d5652c459af06821d910c2fbc834f615c38a1578946d71e904894e27ac63be1ebba9689cc342bd5a299f8bb18694a388eb441ae", 0xd6}, {&(0x7f0000000e80)="ae72e6d9f9a5f5e5a795f64f8c0aec64514d2929a0632acf9eaed3eb", 0x1c}, {&(0x7f0000000ec0)="105b391da007c7ab2d608dbc009ab8da6a68f62914bf6e11c9bb521bec16317803c97bbd5392", 0x26}, {&(0x7f0000000f00)="d2903f0255ce21886303fcb6838db34fa6e10e745e02402127f8c707d6a8a2db4ff7e4aa9091060ba12e3473a30c92ed7bc28404b29a4f1e551d6895b68f60fa0dbfc534597363c04443171facd3838e81f7a09ebf7a13a53dfd78c72e927dffc77e711383eaf6f9dad90b2913b3f695d44aff46e659e91ec20d9eb2c7e456cad17b8a4679368059602c51c9648f96ca23ab4cf1", 0x94}, {&(0x7f0000000fc0)="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", 0xfe}, {&(0x7f00000010c0)="52ecfaf70d7c6a33c42ffd201365101f353d713f7113f472e43d123ba900a60df70e27ad5e928423ff3bcc76d9be0ffc22", 0x31}, {&(0x7f0000001100)="d91d76ff08c35beec1d6b9b18b1c2cd6feb9cadf5b39c54b494aa37d7f29c29fecdf4040abcdb98992c4c7e5", 0x2c}], 0x7, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x1b8}}, {{&(0x7f0000001380)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x6e9, 0x1, 0x2, {0xa, 0x4e23, 0x7, @private0}}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001400)="0bdd85de3b988d9df04b410c44d22e749fd3728306d8d4f30dd0c9471c88c73ed4a86895e1ba180ab5165597db6d760452f068ef18c2e2b1aaa5b2c2134d42", 0x3f}, {&(0x7f0000001440)="b853b80711ced42c329cf724aa6b5d86c495c3cf1cd397f35dccf67edcbe5ba8541076ea28a53c39887ad7f5b02621b550147b59865cdc389c44614c7c2fe0520d3a7dd17449faf9a9f2be0b289a832dfc5182440ebb5acc9e4a8495885e20235ea5f636ae77acc84cfcf0313a8cda8ad565918a3ea728", 0x77}, {&(0x7f00000014c0)="d91a2514790e8e87396aef70d6a50030c47323b3ded3dfad38e649661a907bb556a6b9b28f4169499cea4e22dcb6e5ce", 0x30}], 0x3}}], 0x4, 0x40) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x60000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:49 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8908, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:25:49 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000005240)) [ 2142.812118] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2142.837730] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:50 executing program 2: mkdir(&(0x7f00000011c0)='./file0\x00', 0x0) 07:25:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xdf00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x6afc, 0x4, 0x283}, 0x40) 07:25:50 executing program 2: mount$bpf(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)) [ 2143.164612] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r2, @ANYBLOB="0800050002"], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000fedbdf250e00000008000300", @ANYRES32=r2, @ANYBLOB="0c009900001000001300000011007f007506010001010000250301080500925cc581f1ada01dd67be70000"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011ca52e5a9e2d0096529000100490f00", @ANYRES32=r5], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:25:50 executing program 4: bpf$OBJ_PIN_MAP(0x1e, 0x0, 0x0) 07:25:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:25:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe000) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2143.372621] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2143.395162] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc6026094260123600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000932100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004253e1257d8a3f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) syz_mount_image$hfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x6, 0x9, &(0x7f00000009c0)=[{&(0x7f0000000340)="4bc0dc876c2c8724430a2035348c965d8cdc3d6fa52352b4dfbd2ce355411d1a9748c37b316a265ef031e6c116d30cef478e865aa39ab06e41c8b9805e7598a32011a67b479c", 0x46, 0x3}, {&(0x7f00000004c0)="60c21d6f512e57011a4160dd87b2502b3899ebea08d8ae2b7f1b4d9d61236a5383345ca266312a30415d56ae2a249759d5ef7c7124976eb32ab92b", 0x3b, 0x7}, {&(0x7f0000000500)="3589", 0x2, 0x100000001}, {&(0x7f0000000540)="aa7dd3aaafdd48752a93a1dddac74e8d33dc1ed286bfff428de2064e4f8b7c638acdd95b1b52e0d0df480d5fe9095da3142f5f38b84bfdc1a4d69f20c36997e00e6a455f7eb857be2cc6f8a8b2869486aedbb8620fd6fe92b20ab9c3701dcd698ca3986bd7b525193223fb5ca38fe77d1e2e658fd2fbb0955cc7d68f093e0a12f373ebe5439be0af9187fe633b7fc4b579cebb601ec792097d5890b7fa2bb0324a6249591f8d31add6c1388df2d30053be2d049cb6c26b07feb8fbe721850e250de8b69dc4a112f49515b1eb130a322575df53c7dde45d39fb28ab6f85ee4cbd24b86b6644e5a6647b2dea534019cb5c5b259028827d", 0xf6, 0x14b4}, {&(0x7f0000000640)="a2c52cc0be8226a9f6fca1", 0xb, 0xf80}, {&(0x7f0000000680), 0x0, 0x1}, {&(0x7f0000000780)="79d76b9eb93d02bc98382261ff6b30cbdeb8ef12f45fcf09aa268067366b4598b493b57f0dd6ed6d69bb83ef546947e03f3c1f0492f86e57df6692d8adc4885bfb5824295180255416e60e24b85f4b95e1e990194d3bbd4f55122918d6b1371bfd1f8254f7c78e2feea94f8606de78daed5b421cc61819679b361c699311076792548548c76483cf294132d3cff2088433f3e0a6035a2ba08b876d5ecc4a37f9ba9a88009b71bee30182478f6be5830c648f2f5b42744cfb517d50633a3803a0f3c75e08ca2071e1", 0xc8, 0x40}, {&(0x7f0000000880)="1f337f3a8c78568b732dbf1ec89ac182e284ddba9a28cba28ec38fdfde3c88c4350aef470287492f10b07daa103e01bb456a7cd6155eba17d275e3ea77209666dbfbd6f23c725f5ffe694c9240c8867a09dc866bc94e4b7bcebeee1b6024702d4c148c37c6d822f629a2f446a939282935e69dd73d", 0x75, 0xff}, {&(0x7f0000000900)="4fa9898c00472307e4535973f02a07afd61244745ef2a9560f3026f17226359b4178a133b2b32f80d92daf4e262626a2e172ce6aad622697d2bf5a62e2613cc38efb19026000297359cdbcf43d8c926225519c80833f6e32e0c5a4ba905a29eec6e138b8b6662a44b99396df0e66faeec1167683a34628b8e8db000fd7629e748364a8412dc42b3f38737eaa7945e48dfd7ea86a96c894ab0587384aeef8", 0x9e, 0x7}], 0x4000, &(0x7f0000000ac0)={[{@file_umask={'file_umask', 0x3d, 0xb0}}, {@codepage={'codepage', 0x3d, 'macroman'}}, {@codepage={'codepage', 0x3d, 'cp855'}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@dir_umask={'dir_umask', 0x3d, 0x5cb}}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x36, 0x37, 0x32, 0x0, 0x62, 0x36, 0x33], 0x2d, [0x37, 0x37, 0x8, 0x36], 0x2d, [0x33, 0x33, 0x37, 0x30], 0x2d, [0x33, 0x65, 0x0, 0x36], 0x2d, [0x62, 0x0, 0x30, 0x39, 0x33, 0x31, 0x63, 0x37]}}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 2143.486072] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2143.576417] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:50 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@broadcast, @random="7685558a011d", @val, {@ipv4}}, 0x0) 07:25:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x65580000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 07:25:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a700000007000000000000000000000055c1f276e18a05cdcedff9f5be6024bf386541d3957e8b6edcfe8cdd512478035e5454e8ed6df353aaee0858cc5492c94abec99447a3f690b6294afc9b6e7c12b992b1aa1fde4e10652ebe7aa18d2c1307e4b3552caa70fb6b857692d737de9932cee2fb66d58c3fc5e8879d80db8f882bc5207a6d6b8dbc5ab1274d1066fda241727a53598cfd5e8c0aa982dadb3c8d2c3c8adbfbf5c6a1a6df35e81db4b2101eca318553ff68a2c37280f14132bd7cdb7b81747b10"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/54, 0x36) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x0, 0x6, 0x2) sendfile(r0, r2, &(0x7f0000000200)=0x1346, 0x5) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000480)='\xd9sTK \xdfQ\xa6\x9b\x83\xa4\xf7\xac?\"B\x15\x90\x95\xe7\x90\xf2\x1a6\xde\x12\xbes#\xb3\x86}\bR:\b#O\xb4\xc9\xbc\xd8\b\x0fL,WwZ\x91.4\x1ar\x17Z\xc1\x8e\x83\xb5\n\xf0S\xb5\xa0\x8b\'\xe0Se\x85\x04^&\x81U<\xe3G\xdc\xf3;-\xe5\xc2]0f)\xf8\x84\xb8\xd9\xa6\x8b\xb0j\xfc\xcf\x9c\x99.\x12\xbb\x00\xec\x8d\xec\x06\x007(\xa7\x0eKs\xb0\xd3b9\x14+\x13\xad\xf1\xa9RW\xea9\xfa4\x7f\xcb\xe2\xef\xd5x\xaa\x13\xe2\x7fU\x82\xa1m\xf2\xe5\xf8\x94\xb2\xdaC|\x1e\r7\x1e\xea\x7f\xb5\x00\x82\xceoV\x1e\xee\x81M_\xfdIu(\x83\xd6\xe3y\xdd\xe4ZcC\x93\xe8R\xe2\x86H\x1b1\x8c\xbf(\x069`\xba>2n\vk1 \x9f\x85') 07:25:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x85}, 0x9c) 07:25:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r1}, 0x8) [ 2143.765085] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:25:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe100) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:25:50 executing program 2: syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') [ 2143.962581] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:25:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x46, 0x0, 0x0) 07:25:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001d00)=[@mark={{0x14}}], 0x18}}], 0x2, 0x0) 07:25:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe200) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2144.347896] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2144.610264] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2144.758511] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2144.774385] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2144.789068] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:25:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4df}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f00000001c0)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000980)={'ip6tnl0\x00', &(0x7f0000000900)={'syztnl1\x00', 0x0, 0x29, 0x81, 0x20, 0x9, 0x48, @mcast1, @mcast1, 0x8, 0x20, 0x8, 0x6}}) sendmsg$nl_route_sched(r0, &(0x7f0000000a40)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=ANY=[@ANYBLOB="3c000000660000022cbd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="e0fff1ff000500020008000b000600000008000b000500000008000b0005000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x8010) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRESDEC=r2], 0x401, 0x800) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r4 = getgid() r5 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r4, 0x0, r4]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r6, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r5}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x10200, 0x50) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:25:51 executing program 2: clone(0x40000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:25:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x2) 07:25:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe300) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2144.949172] IPVS: ftp: loaded support on port[0] = 21 [ 2144.984233] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2145.245435] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2145.578253] IPVS: ftp: loaded support on port[0] = 21 [ 2147.237533] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2147.245047] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2147.254436] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2147.261988] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2147.274558] device veth1_macvtap left promiscuous mode [ 2147.280210] device veth0_macvtap left promiscuous mode [ 2147.285548] device veth1_vlan left promiscuous mode [ 2147.295342] device veth0_vlan left promiscuous mode [ 2150.058168] Bluetooth: hci5: command 0x0409 tx timeout [ 2151.575835] device hsr_slave_1 left promiscuous mode [ 2151.583724] device hsr_slave_0 left promiscuous mode [ 2151.603157] team0 (unregistering): Port device team_slave_1 removed [ 2151.613058] team0 (unregistering): Port device team_slave_0 removed [ 2151.625340] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2151.638695] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2151.670772] bond0 (unregistering): Released all slaves [ 2151.688637] IPVS: ftp: loaded support on port[0] = 21 [ 2151.787677] chnl_net:caif_netlink_parms(): no params data found [ 2151.878971] bridge0: port 1(bridge_slave_0) entered blocking state [ 2151.885641] bridge0: port 1(bridge_slave_0) entered disabled state [ 2151.901524] device bridge_slave_0 entered promiscuous mode [ 2151.914889] bridge0: port 2(bridge_slave_1) entered blocking state [ 2151.921615] bridge0: port 2(bridge_slave_1) entered disabled state [ 2151.934108] device bridge_slave_1 entered promiscuous mode [ 2151.964577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2151.979792] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2152.016481] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2152.024879] team0: Port device team_slave_0 added [ 2152.035994] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2152.044372] team0: Port device team_slave_1 added [ 2152.082190] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2152.093650] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2152.124027] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2152.137377] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2152.137922] Bluetooth: hci5: command 0x041b tx timeout [ 2152.149478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2152.175270] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2152.187053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2152.195536] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2152.224102] device hsr_slave_0 entered promiscuous mode [ 2152.230537] device hsr_slave_1 entered promiscuous mode [ 2152.236914] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2152.244732] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2152.374401] bridge0: port 2(bridge_slave_1) entered blocking state [ 2152.380883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2152.387555] bridge0: port 1(bridge_slave_0) entered blocking state [ 2152.394005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2152.448233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2152.458985] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2152.471022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2152.480452] bridge0: port 1(bridge_slave_0) entered disabled state [ 2152.487471] bridge0: port 2(bridge_slave_1) entered disabled state [ 2152.503910] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2152.510411] 8021q: adding VLAN 0 to HW filter on device team0 [ 2152.525272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2152.534667] bridge0: port 1(bridge_slave_0) entered blocking state [ 2152.541237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2152.558514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2152.566245] bridge0: port 2(bridge_slave_1) entered blocking state [ 2152.572670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2152.593900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2152.611840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2152.622499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2152.632708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2152.648459] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2152.659647] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2152.665851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2152.673976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2152.695380] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2152.704062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2152.713726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2152.728526] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2152.752738] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2152.764108] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2152.776890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2152.789449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2152.851205] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2152.864512] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2152.876477] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2152.894669] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2152.904921] device veth0_vlan entered promiscuous mode [ 2152.911501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2152.919724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2152.930058] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2152.937359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2152.960771] device veth1_vlan entered promiscuous mode [ 2152.967115] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2152.982120] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2153.006165] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2153.025458] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2153.034691] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2153.043508] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2153.052332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2153.061678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2153.072549] device veth0_macvtap entered promiscuous mode [ 2153.080975] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2153.091781] device veth1_macvtap entered promiscuous mode [ 2153.098832] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2153.110075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2153.123900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2153.135316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2153.146156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.156310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2153.166649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.176055] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2153.186442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.195887] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2153.206859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.217070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2153.227504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.240402] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2153.248378] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2153.259013] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2153.266559] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2153.274329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2153.282691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2153.293546] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2153.304090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.313825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2153.324171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.333485] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2153.343775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.353208] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2153.363129] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.372391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2153.382361] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2153.392824] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2153.400542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2153.410237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2153.419368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2153.536814] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2153.561253] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2153.581242] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2153.595661] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2153.614548] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2153.622940] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2153.636040] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2153.646699] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2153.712330] device bridge_slave_1 left promiscuous mode [ 2153.720711] bridge0: port 2(bridge_slave_1) entered disabled state [ 2153.741548] device bridge_slave_0 left promiscuous mode [ 2153.751675] bridge0: port 1(bridge_slave_0) entered disabled state [ 2154.217966] Bluetooth: hci5: command 0x040f tx timeout 07:26:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x69170000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe400) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r2}, 0x14) 07:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = msgget(0x3, 0x1) msgctl$IPC_STAT(r2, 0x2, 0x0) msgsnd(r2, &(0x7f0000000040)={0x0, "9ade7769c881659c8bc8f56ab5be3e4039d73c4c019dace55445037857bfc6e83a8c6c40d9d7a6c73570f0f7712763"}, 0x37, 0x0) r3 = getgid() r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x3f, 0x4}, 0x8) 07:26:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, &(0x7f00000001c0)) 07:26:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x22, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) [ 2154.716572] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2154.750060] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2154.801944] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:01 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r0 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r0, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12001, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r1, 0x0, r1]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0x200000ffffffff, 0x3f, 0x0, 0x6, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:02 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10d8c1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000300), &(0x7f0000000340)=@sha1={0x1, "fdfa336f94cb536a35d369559a9e9ebb4488bfc5"}, 0x15, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000e80), &(0x7f0000000100)=@ng={0x4, 0x0, "5db75600000000000800001b00000000000000"}, 0x15, 0x0) 07:26:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b4b081b28559b334c", 0x12e9}], 0x1) 07:26:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe500) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2155.213537] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x6c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x34, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_TOS={0x5, 0x9, 0x80}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}, @IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24008005}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000404}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@ipv4_deladdr={0x2c, 0x15, 0x10, 0x70bd29, 0x25dfdbfc, {0x2, 0x20, 0x9, 0xff, r3}, [@IFA_LABEL={0x14, 0x3, 'macvlan0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r5], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev/nrd0\x00'], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') [ 2155.443836] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2155.517773] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x81000000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x8c) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() r4 = syz_mount_image$bfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x20, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000340)="4d9b71cec21f530bbce6f57a997a1ef4bd10c733d167d7c22337461ff2567713f70487db5b604968e2f5bc6dd9b8d1fb68e25b70a3905d1f1928cd1385214f9f73c1a45a51aa65f12c3254f356fe1b42302b03a70006fd", 0x57}], 0x2060000, &(0x7f0000000500)=ANY=[@ANYBLOB="2cf02c2a2c2c4675443c2f672c73656375726974792e6361706162696c697479002c657569643e", @ANYRESDEC=0x0, @ANYBLOB=',smackfsfloor=ext4\x00,mask=MAY_WRITE,\x00']) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000580)) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x20, r1, 0x601, 0x0, 0x0, {0x3}, [@ETHTOOL_A_RINGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 07:26:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x42, 0x0, 0x0) 07:26:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe600) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x8000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r4], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:02 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000040)={0x0, &(0x7f0000000200)=""/163, 0x0, 0x0}, 0x38) close(0xffffffffffffffff) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8940, &(0x7f0000000040)=0x2) [ 2155.721352] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2155.735878] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2155.762599] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400009) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000f195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x30, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@cgroup, r1, 0x13, 0x6, r1}, 0x14) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/#$\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x47, 0x0, 0x3, 0x0, 0x7ff, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0xe2, 0x7f0000000000, 0x9, 0x1, 0x10001, 0x3, 0x9, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000007c0)=r0, 0x4) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x40, 0xfd, 0x7, 0x21, 0x0, 0x8, 0x20, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x14000, 0x100000001, 0x7fff, 0xc, 0x9, 0x4, 0x7, 0x0, 0xa8f, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="2e00000010008188040f80ec800000000000000026000000e3bdeefb44004f000e000a0010000b2fd6130f97d80a0313", 0x30}], 0x1}, 0x0) [ 2155.837430] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:26:02 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40087602, &(0x7f00000005c0)=0x443000025) [ 2155.892997] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2155.936411] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe700) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2155.982307] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 07:26:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x311000, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7f, 0xf8, 0x7f, 0x7, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x300, 0xffffffffffffff80, 0x4, 0x9, 0x2, 0x212, 0x1f, 0x0, 0x1aa, 0x0, 0x7}, 0xffffffffffffffff, 0x6, r1, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) msgrcv(r2, &(0x7f00000004c0)={0x0, ""/6}, 0xe, 0x2, 0x0) r3 = getgid() r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2156.033306] EXT4-fs warning (device sda1): ext4_ioctl:814: Setting inode version is not supported with metadata_csum enabled. 07:26:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x88a8ffff, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2156.139663] EXT4-fs warning (device sda1): ext4_ioctl:814: Setting inode version is not supported with metadata_csum enabled. [ 2156.204150] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2156.269446] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x0, 0x0, 0x3}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, r0}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0xe, &(0x7f0000001a00)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000fbffffff2d6405000000000065040400010000000404000001007d60b7030000080000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf4143919be70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000006e60000000000000000000000000000000790ae2fd45d54b107c8c000000000000520ad6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9b232fe2238fff867ba8fd41b29f088d47c7cc54c64caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef735dc5ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b5dd884137d5f7a6edba86a7f9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e716b256acf183d8e55580a678c664813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b1405e7daef356602487886b6f0beb5ca9a9b31a57e25525fa0ff5c2226e79db12959e59f2c911ee035c82f1a81ef15b43d51ff1fa025bfb80674cd17c1e4d8de1b5881df2b0f0695997dc2b7f3f88df4592"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002d008108040f8100db5cb90500f0ffffffffffff00000000d9d38f000000003808000100030000000000", 0x2e}], 0x1}, 0x0) 07:26:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe800) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2156.754439] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xe900) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2157.054742] team0: Port device team_slave_1 removed [ 2157.063065] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2157.079386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) recvmsg(0xffffffffffffffff, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000680)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000000c0)=""/64, 0x40}, 0x40000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x8001a0, 0xe, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0x140) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004500)={0x0, 0x0, 0x0, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb79f69574d20ffa4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x12, 0x0}, 0x78) [ 2157.104766] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2157.129659] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 07:26:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x9effffff, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2157.205441] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2157.231914] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2157.315667] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2157.445092] device syzkaller1 entered promiscuous mode [ 2157.472020] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2157.536845] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2160.061884] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2160.069219] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2160.078338] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2160.085430] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2160.099103] device veth1_macvtap left promiscuous mode [ 2160.104426] device veth0_macvtap left promiscuous mode [ 2160.110242] device veth1_vlan left promiscuous mode [ 2160.115430] device veth0_vlan left promiscuous mode [ 2161.499855] ieee802154 phy0 wpan0: encryption failed: -22 [ 2161.505428] ieee802154 phy1 wpan1: encryption failed: -22 [ 2162.456977] Bluetooth: hci5: command 0x0409 tx timeout [ 2164.416815] device hsr_slave_1 left promiscuous mode [ 2164.424252] device hsr_slave_0 left promiscuous mode [ 2164.442158] team0 (unregistering): Port device team_slave_1 removed [ 2164.451522] team0 (unregistering): Port device team_slave_0 removed [ 2164.462747] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2164.474426] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2164.508273] bond0 (unregistering): Released all slaves [ 2164.524596] IPVS: ftp: loaded support on port[0] = 21 [ 2164.546974] Bluetooth: hci5: command 0x041b tx timeout [ 2164.635258] chnl_net:caif_netlink_parms(): no params data found [ 2164.765232] bridge0: port 1(bridge_slave_0) entered blocking state [ 2164.773421] bridge0: port 1(bridge_slave_0) entered disabled state [ 2164.786086] device bridge_slave_0 entered promiscuous mode [ 2164.801284] bridge0: port 2(bridge_slave_1) entered blocking state [ 2164.809480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2164.822271] device bridge_slave_1 entered promiscuous mode [ 2164.853720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2164.870529] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2164.905092] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2164.914319] team0: Port device team_slave_0 added [ 2164.925420] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2164.934901] team0: Port device team_slave_1 added [ 2164.968612] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2164.974868] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2165.007791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2165.026157] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2165.034122] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2165.071689] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2165.113577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2165.121489] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2165.163718] device hsr_slave_0 entered promiscuous mode [ 2165.175115] device hsr_slave_1 entered promiscuous mode [ 2165.183229] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2165.197117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2165.334776] bridge0: port 2(bridge_slave_1) entered blocking state [ 2165.341212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2165.347974] bridge0: port 1(bridge_slave_0) entered blocking state [ 2165.354334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2165.421515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2165.450568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2165.473619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2165.485071] bridge0: port 1(bridge_slave_0) entered disabled state [ 2165.510356] bridge0: port 2(bridge_slave_1) entered disabled state [ 2165.525960] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2165.535326] 8021q: adding VLAN 0 to HW filter on device team0 [ 2165.556032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2165.565935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2165.582335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2165.592012] bridge0: port 1(bridge_slave_0) entered blocking state [ 2165.598433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2165.611087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2165.619073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2165.627634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2165.635222] bridge0: port 2(bridge_slave_1) entered blocking state [ 2165.641624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2165.653757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2165.671908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2165.691883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2165.700349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2165.713972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2165.720919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2165.730369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2165.738493] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2165.750549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2165.757969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2165.766352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2165.778618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2165.787074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2165.794760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2165.803973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2165.815198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2165.824239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2165.838629] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2165.844867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2165.859902] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2165.867904] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2165.874178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2165.881658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2165.893920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2165.909574] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2165.920421] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2165.928035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2165.936171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2165.969353] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2165.976352] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2165.983825] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2165.995060] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2166.002929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2166.010945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2166.019373] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2166.026465] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2166.035647] device veth0_vlan entered promiscuous mode [ 2166.049324] device veth1_vlan entered promiscuous mode [ 2166.055186] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2166.065602] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2166.080991] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2166.090447] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2166.097418] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2166.104801] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2166.112545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2166.120629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2166.131061] device veth0_macvtap entered promiscuous mode [ 2166.139504] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2166.150131] device veth1_macvtap entered promiscuous mode [ 2166.156271] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2166.166208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2166.176971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2166.185586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2166.196194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.206075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2166.216430] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.226320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2166.237797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.247052] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2166.256842] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.265950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2166.275745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.285975] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2166.293316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2166.301259] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2166.309801] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2166.318113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2166.325925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2166.336787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2166.347910] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.358026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2166.368014] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.377572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2166.387360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.396861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2166.406619] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.415726] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2166.425505] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2166.435676] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2166.444053] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2166.452631] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2166.461193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2166.579679] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2166.586285] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2166.614640] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2166.622092] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2166.623751] Bluetooth: hci5: command 0x040f tx timeout [ 2166.635197] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2166.656019] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2166.665369] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2166.678160] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2166.735792] device bridge_slave_1 left promiscuous mode [ 2166.743487] bridge0: port 2(bridge_slave_1) entered disabled state [ 2166.764144] device bridge_slave_0 left promiscuous mode [ 2166.772205] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x8001a0, 0xe, 0x0, &(0x7f0000000380)="4d50b441e692763513ef874588a8", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_freezer_state(r0, &(0x7f0000000380)='FROZEN\x00', 0x140) 07:26:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)='@', 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0/file0\x00', 0x5, 0x2, &(0x7f0000000500)=[{&(0x7f0000000340)="48fd7ff338ca3ca14129668cf57f429465565d682e9e01b9e62e088421b8c468bb0817262a24aa587cbb59ab3189c8aaa67d6d932c0a078462bcac988cef3776e72137331d0479070ccd657a5e7fb0e29f0c4d", 0x53, 0x2}, {&(0x7f00000004c0)="3bcf3c6b0faa350a5290bf31a558ebf10e3675535150f51de921b6dfb2b3c0842ad3", 0x22, 0x7}], 0x9860, &(0x7f0000000780)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}], [{@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '\xc1(9\x00V\x99\xc6\xdc\xbf5\xb1l=\xe6\xb1g$\x82\x8dF\x89\xb5\x81\xb4\x9d\xc3\xdb\xc7\xd448,\xec1\xf3\xaf\xda\xc0B\xce|\xd1\x90Z\f\x95\b\xc8\x13I\at~\xd9\x8cG\x15\xbdyn#\xfe*\x1d\xbf\xe9mw\xff\x80\xdc*\xd8\xb7\xb1o\xeb\x0fY=\xd41\xcd\x17\xad\xfbV\xb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\xf2\x03$\xc7\\G=\x9a\xe3\x82\xa7\xf6\xaa\xd2^\x17\x99\xe0\x1f\xa2\xcd\xe9F\x85\xee\x98\xfd\v\xdb\xc4\f*\x18\xa2i\x1e\x109\x8a\xa5yg\xde\x7f\x8bxv\xe5\xeaT\xbb\x19\x83g\x148/\xd6\xd0\xdd\x97`\xec\x11\x17\x98z\xbf\xbb1Z\xc9\xc6\x7f\xaf)\xab\xac \x05\xe9P\x8f\x8f\xffw\x89\xa6\x1a\xf9[\x8b(IJ3\\\x1f\xfc\xb4\xa2lY\x975\xad\xef\x1d\x9b\xf3o@\xa0\xbf\xc9\x86\xe5\xa7b\xec\xce\x05Ey\xe7\x0f<\xa2\xceL\xd2`\xb8\x86\x89\ff/\xcf\xcb\xbf\v\x89\x7f\x14\xf9\xd2Fm\x12\x86_l\xb7\xf1h\xd5\x8c\x92J\xfaz\xd5b)N^\a\xa1F\xe4\xfd\xc8\xc8\b\xbd,\xa7\xda\xc9\x10/,q\xd9\x9a\x85\x1e`ZRk\x9f?N\xae\xa8\xca\xde\x02\n\xc8\xc3O0\x89M))B\xce\\\xde\xa7\x14\x11\xe6xnTtVP\xb6|$\x7f:\xb3'}}]}) r3 = getpid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010001000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000588", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee01, @ANYBLOB="02000500", @ANYRES32, @ANYBLOB="040002000000000008000200", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="10000300000000002000000000000000"], 0x9c, 0x3) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000c00)={{0x2, 0xffffffffffffffff, r2, 0x0, 0x0, 0x40, 0xbc}, 0x0, 0x0, 0x10000000000, 0x3, 0x751, 0x2, 0x7, 0x0, 0x8000, 0x33a3, r3, r3}) getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xea00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf0ffffff, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x38c5}}], 0xc6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000280300007c0100007c0100007c010000034800000500000060020000600200006002000060020000600200000300000000000000001d00000000000000000700000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000014017c0100000252000000000000000000000000000000003800636f6e6e6279746573000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000380073746174697374696300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000010000000000000000000000006e657462696f732d6e7300000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006815dc7dec7c041e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400e400000000000000000000000000000000000000000040005443504f505453545249500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a400c80000000000000000000000000000000000000000002400"/896, @ANYRES32], 0x384) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200)=0x5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) [ 2167.707094] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2167.733501] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xeb00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2167.866771] device syzkaller1 entered promiscuous mode [ 2167.873199] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2167.989152] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xec00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) msgctl$IPC_RMID(0x0, 0x0) r5 = getpgrp(r3) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x6, 0x7, 0x5, 0xb6, 0x0, 0x0, 0x82210, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x80, 0x8, 0x4, 0x3, 0x7, 0x7, 0x8, 0x0, 0x6, 0x0, 0x9}, r5, 0x1, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2168.262293] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2168.309386] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000200)=0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@RTM_DELMDB={0x38, 0x55, 0x300, 0x70bd28, 0x25dfdbff, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r3, 0x0, 0x0, 0x0, {@ip4=@multicast1, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2040000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a00)=@delqdisc={0xa4, 0x25, 0x200, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0x10}, {0xfff2, 0x10}, {0xd, 0xa}}, [@TCA_STAB={0x54, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3d, 0x9, 0x2, 0x5, 0x0, 0x8f, 0x4, 0x1}}, {0x6, 0x2, [0x9]}}, {{0x1c, 0x1, {0x2e, 0xd2, 0xf5, 0x1000, 0x2, 0x401, 0x40, 0x6}}, {0x10, 0x2, [0x3ff, 0x3ff, 0x0, 0x4, 0x4, 0xe00]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}, @qdisc_kind_options=@q_choke={{0xa}, {0x18, 0x2, [@TCA_CHOKE_PARMS={0x14, 0x1, {0x10001, 0x7fff, 0x2, 0x14, 0xd, 0x1, 0x8}}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x78, r4, 0x100, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x6040824}, 0x24000000) 07:26:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xffffa888, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2168.478535] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2168.537440] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xed00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2168.593187] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2168.742232] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2168.992255] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2169.008546] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 07:26:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={0x0, 0xf0ff7f00000000}}, 0x0) 07:26:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r3 = socket(0x6, 0x3, 0x9) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x401, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1f}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x900000}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40005}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xee00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2169.063990] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r2, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x3, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2169.160323] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x3}, 0x0) [ 2169.499114] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2169.830007] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) 07:26:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xfffff000, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:17 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) 07:26:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xef00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@RTM_GETNSID={0x2c, 0x5a, 0x500, 0x70bd28, 0x25dfdbff, {}, [@NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_FD={0x8}, @NETNSA_NSID={0x8, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) [ 2170.884700] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2170.942925] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:26:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) [ 2171.264315] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2171.283061] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2171.321017] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2171.713950] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2171.721042] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2171.730878] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2171.740110] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2171.753413] device veth1_macvtap left promiscuous mode [ 2171.759806] device veth0_macvtap left promiscuous mode [ 2171.767022] device veth1_vlan left promiscuous mode [ 2171.772231] device veth0_vlan left promiscuous mode [ 2174.615922] Bluetooth: hci5: command 0x0409 tx timeout [ 2176.050778] device hsr_slave_1 left promiscuous mode [ 2176.058511] device hsr_slave_0 left promiscuous mode [ 2176.077822] team0 (unregistering): Port device team_slave_1 removed [ 2176.092180] team0 (unregistering): Port device team_slave_0 removed [ 2176.101616] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2176.114066] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2176.147525] bond0 (unregistering): Released all slaves [ 2176.163956] IPVS: ftp: loaded support on port[0] = 21 [ 2176.250670] chnl_net:caif_netlink_parms(): no params data found [ 2176.336907] bridge0: port 1(bridge_slave_0) entered blocking state [ 2176.343373] bridge0: port 1(bridge_slave_0) entered disabled state [ 2176.352591] device bridge_slave_0 entered promiscuous mode [ 2176.362004] bridge0: port 2(bridge_slave_1) entered blocking state [ 2176.369842] bridge0: port 2(bridge_slave_1) entered disabled state [ 2176.381994] device bridge_slave_1 entered promiscuous mode [ 2176.420136] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2176.432466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2176.470568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2176.483321] team0: Port device team_slave_0 added [ 2176.492290] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2176.503211] team0: Port device team_slave_1 added [ 2176.540009] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2176.549104] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2176.582015] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2176.600939] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2176.608412] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2176.639434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2176.652864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2176.665355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2176.695007] device hsr_slave_0 entered promiscuous mode [ 2176.702643] device hsr_slave_1 entered promiscuous mode [ 2176.708926] Bluetooth: hci5: command 0x041b tx timeout [ 2176.715354] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2176.722812] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2176.826874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2176.833295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2176.840009] bridge0: port 1(bridge_slave_0) entered blocking state [ 2176.846449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2176.919315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2176.931380] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2176.946025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2176.960311] bridge0: port 1(bridge_slave_0) entered disabled state [ 2176.969723] bridge0: port 2(bridge_slave_1) entered disabled state [ 2176.989142] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2176.995235] 8021q: adding VLAN 0 to HW filter on device team0 [ 2177.014139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2177.030568] bridge0: port 1(bridge_slave_0) entered blocking state [ 2177.037008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2177.062064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2177.074863] bridge0: port 2(bridge_slave_1) entered blocking state [ 2177.081294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2177.107092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2177.115125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2177.123567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2177.131862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2177.142709] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2177.149281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2177.160078] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2177.173488] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2177.184591] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2177.192945] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2177.200438] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2177.216681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2177.233780] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2177.244634] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2177.251922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2177.261141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2177.330624] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2177.338394] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2177.345234] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2177.358550] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2177.365166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2177.374394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2177.390607] device veth0_vlan entered promiscuous mode [ 2177.401989] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2177.411439] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2177.431948] device veth1_vlan entered promiscuous mode [ 2177.442033] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2177.458701] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2177.471726] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2177.484213] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2177.491320] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2177.499237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2177.507082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2177.514917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2177.524945] device veth0_macvtap entered promiscuous mode [ 2177.531797] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2177.541836] device veth1_macvtap entered promiscuous mode [ 2177.548307] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2177.558438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2177.569626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2177.579435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2177.589914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.599475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2177.610825] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.620181] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2177.630854] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.640133] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2177.650245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.659804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2177.669629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.679742] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2177.687062] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2177.694381] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2177.702154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2177.710900] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2177.719461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2177.730028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2177.740696] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.750027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2177.759942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.769631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2177.779561] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.788820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2177.798741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.808128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2177.818104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2177.828599] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2177.836075] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2177.843455] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2177.851737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2177.976812] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2177.983762] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2177.999012] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.030234] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2178.040949] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2178.048277] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2178.055420] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2178.065769] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2178.111080] device bridge_slave_1 left promiscuous mode [ 2178.121979] bridge0: port 2(bridge_slave_1) entered disabled state [ 2178.143873] device bridge_slave_0 left promiscuous mode [ 2178.150392] bridge0: port 1(bridge_slave_0) entered disabled state [ 2178.775734] Bluetooth: hci5: command 0x040f tx timeout 07:26:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf000) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xd3, &(0x7f0000000180)=""/211, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 07:26:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) 07:26:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) sendmsg$nl_route(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getstats={0x1c, 0x5e, 0x10, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x24000050) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r4 = getgid() r5 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r4, 0x0, r4]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r6, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r5}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f140064be39"], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xffffff7f, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2179.085364] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:26 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$ptp(r0, &(0x7f0000000240)=""/209, 0xd1) 07:26:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14}, 0x14}, 0x8}, 0x0) [ 2179.127994] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:26 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 07:26:26 executing program 2: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 07:26:26 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002480), 0x788d41, 0x0) fcntl$getownex(r0, 0x10, 0x0) 07:26:26 executing program 2: add_key$keyring(&(0x7f00000000c0), 0x0, 0x1ffff000, 0xfffff, 0x0) 07:26:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf100) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:26 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r1, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r2, 0x1}, 0x14}}, 0x0) 07:26:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) [ 2179.688056] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2179.699991] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2179.749713] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2179.757826] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x4f, 0x20, 0x6, 0x0, 0xb9, 0x19400, 0xf, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x80000000, 0x9}, 0xa208, 0x100, 0x7, 0x1, 0x7, 0x1f, 0x4, 0x0, 0x80, 0x0, 0x7ff}, 0xffffffffffffffff, 0xc, r1, 0x0) r3 = getgid() r4 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r3, 0x0, r3]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r5, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f00000003c0)={0x6c7}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0xff, 0x7, 0x3, 0x81, 0x0, 0x8001, 0xa0082, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6469, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x2, 0x38f3, 0x8, 0x6, 0x34a2, 0x20, 0xffe0, 0x0, 0xffff0f99, 0x0, 0xdd0f}, r4, 0x0, 0xffffffffffffffff, 0x2) 07:26:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003080800418e00000004fcff", 0x58}], 0x1) [ 2179.813893] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xffffff9e, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:26 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x4c, 0x13, 0x6ec3f6df72a9bf1d}, 0x4c}}, 0x0) 07:26:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="200000ea6101ab0000043b780500000000000000000000070000000000000000000000f7842f911a186c0e"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:27 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="88000000", @ANYRES16=r0, @ANYBLOB="0100000000000000000004000000740001"], 0x88}}, 0x0) 07:26:27 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x8, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2180.017094] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf200) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2180.101692] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:27 executing program 4: socketpair(0xa, 0x2, 0x1, &(0x7f0000000380)) [ 2180.161276] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:27 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)={&(0x7f0000001880)={0x14, r0, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={0x0}, 0x1, 0x0, 0x0, 0x85}, 0x4000811) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x420a80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x198, r0, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x1f}, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @mcast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x73}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6bc2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7a329556}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_BEARER={0x24, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x85}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x16700}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="84000000", @ANYRES16=r0, @ANYBLOB="000427bd7000fbf3df250a0000005400028008000200777500002400038008000100070000000800010028000000080001000700000008000200640b0000040004000400040008000200b6570000140003"], 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x10040000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x18, r2, 0x1, 0x0, 0x1, {}, [@TIPC_NLA_BEARER={0xe4}]}, 0x18}}, 0xc004) [ 2180.226499] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2180.326147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x140) [ 2180.393233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 07:26:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf300) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2180.624811] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2180.840477] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2180.994101] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2181.014413] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2181.026501] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf400) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={0x0}}, 0x20000000) [ 2181.179435] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2181.198891] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2181.558521] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2183.123333] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2183.130238] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2183.140186] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2183.147139] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2183.159064] device veth1_macvtap left promiscuous mode [ 2183.164467] device veth0_macvtap left promiscuous mode [ 2183.169956] device veth1_vlan left promiscuous mode [ 2183.175062] device veth0_vlan left promiscuous mode [ 2186.214933] Bluetooth: hci5: command 0x0409 tx timeout [ 2187.470601] device hsr_slave_1 left promiscuous mode [ 2187.478897] device hsr_slave_0 left promiscuous mode [ 2187.494375] team0 (unregistering): Port device team_slave_1 removed [ 2187.509172] team0 (unregistering): Port device team_slave_0 removed [ 2187.520278] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2187.532307] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2187.567435] bond0 (unregistering): Released all slaves [ 2187.582933] IPVS: ftp: loaded support on port[0] = 21 [ 2187.701449] chnl_net:caif_netlink_parms(): no params data found [ 2187.811423] bridge0: port 1(bridge_slave_0) entered blocking state [ 2187.822453] bridge0: port 1(bridge_slave_0) entered disabled state [ 2187.833187] device bridge_slave_0 entered promiscuous mode [ 2187.849478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2187.859676] bridge0: port 2(bridge_slave_1) entered disabled state [ 2187.870882] device bridge_slave_1 entered promiscuous mode [ 2187.907843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2187.921291] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2187.951889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2187.959956] team0: Port device team_slave_0 added [ 2187.971125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2187.979516] team0: Port device team_slave_1 added [ 2188.009489] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2188.015892] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2188.041730] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2188.060307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2188.066748] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2188.098538] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2188.112418] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2188.124377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2188.162072] device hsr_slave_0 entered promiscuous mode [ 2188.169217] device hsr_slave_1 entered promiscuous mode [ 2188.176145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2188.183545] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2188.287453] bridge0: port 2(bridge_slave_1) entered blocking state [ 2188.293841] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2188.300556] bridge0: port 1(bridge_slave_0) entered blocking state [ 2188.304765] Bluetooth: hci5: command 0x041b tx timeout [ 2188.306975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2188.381400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2188.391093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2188.408495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2188.421630] bridge0: port 1(bridge_slave_0) entered disabled state [ 2188.429927] bridge0: port 2(bridge_slave_1) entered disabled state [ 2188.451093] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2188.457849] 8021q: adding VLAN 0 to HW filter on device team0 [ 2188.469977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2188.478452] bridge0: port 1(bridge_slave_0) entered blocking state [ 2188.484871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2188.508126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2188.516316] bridge0: port 2(bridge_slave_1) entered blocking state [ 2188.522654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2188.542140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2188.550327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2188.559519] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2188.577180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2188.584913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2188.593768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2188.605801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2188.614315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2188.633120] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2188.640162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2188.653398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2188.663138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2188.686689] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2188.695945] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2188.702256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2188.710662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2188.724284] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2188.742575] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2188.753784] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2188.763314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2188.780977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2188.830122] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2188.837767] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2188.844465] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2188.856972] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2188.863600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2188.872876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2188.882826] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2188.891783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2188.900983] device veth0_vlan entered promiscuous mode [ 2188.912916] device veth1_vlan entered promiscuous mode [ 2188.919172] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2188.928860] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2188.942301] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2188.952668] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2188.959941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2188.968174] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2188.975933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2188.983633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2188.994949] device veth0_macvtap entered promiscuous mode [ 2189.001289] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2189.010565] device veth1_macvtap entered promiscuous mode [ 2189.019178] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2189.029131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2189.039859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2189.049928] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2189.060253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.070205] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2189.080458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.090334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2189.100675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.110350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2189.120603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.130231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2189.140488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.152029] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2189.159723] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2189.167899] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2189.181624] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2189.195571] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2189.204256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2189.216385] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2189.226504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.237295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2189.247265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.256558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2189.266775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.276386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2189.286333] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.295622] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2189.305495] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2189.316340] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2189.323407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2189.331715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2189.340083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2189.462861] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2189.480467] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2189.492401] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2189.523442] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2189.534793] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2189.541344] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2189.552169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2189.560071] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2189.612440] device bridge_slave_1 left promiscuous mode [ 2189.622851] bridge0: port 2(bridge_slave_1) entered disabled state [ 2189.645049] device bridge_slave_0 left promiscuous mode [ 2189.651357] bridge0: port 1(bridge_slave_0) entered disabled state [ 2190.384778] Bluetooth: hci5: command 0x040f tx timeout 07:26:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x21b16f53f926f195) 07:26:37 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="88000000", @ANYRES16=r0, @ANYBLOB="0100000000000000000011"], 0x88}}, 0x0) 07:26:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf500) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xffffffff, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r2 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r2, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x2, 0xee00, 0x0, 0x0, 0x0, 0x132, 0x80}, 0x0, 0x0, 0x400, 0x2, 0x5, 0x65333b9c, 0x10000, 0x3, 0x4, 0x6, 0x0, r3}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r4 = getgid() r5 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r4, 0x0, r4]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r6, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r5}) msgsnd(r2, &(0x7f0000000340)={0x2, "3b70fe1992fe901501d7b1ba841bed57f2c33391b11179fb8dc602919ee5893eaa0832cad076450a5f799a9aeb1c1c89bb03356bccfa81c0344c569acdf9c1ef219dd8c0d35d7ebee18e55570e2e2f759a3eecdf69157455fd82fd0113e3a93768113a0aec3df06bd9d2"}, 0x72, 0x800) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e02000000000000000000000000000000000000000000970000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ff0000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa000, 0x83) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x74, r0, 0x711, 0x0, 0x0, {0x6}, [@BATADV_ATTR_HARD_IFINDEX, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x0, 0x30, 0x1}]}, 0x24}}, 0x4000) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x60, r0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xe67a}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc5dd}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x66}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffd}, @BATADV_ATTR_MULTICAST_FANOUT={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x5) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x200000c1}, 0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r4], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000200)=ANY=[@ANYBLOB="692f6465762f6e62fb09b91c68b7a6071fb37155c66430"], 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, 0x0, 0x4a9}, 0x40) [ 2190.609213] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2190.628045] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2190.651933] nla_parse: 3 callbacks suppressed [ 2190.651943] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. 07:26:37 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) [ 2190.723632] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.4'. 07:26:37 executing program 4: socketpair(0xa, 0x2, 0x88, &(0x7f0000000380)) 07:26:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf600) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:37 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x54, 0x13, 0x6ec3f6df72a9bf1d, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 07:26:38 executing program 4: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x18, r0, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) 07:26:38 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)={0x14, r0, 0xf19, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 07:26:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x0, 0x220403) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r3, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x78, r4, 0x400, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x3ff, 0x5d}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_PMK={0x14, 0xfe, "b7618373f7ffbc6665042abd9089618a"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x3}, @NL80211_ATTR_PMK={0x14, 0xfe, "645365f42625a212a93c75afd41da48b"}, @NL80211_ATTR_PMKID={0x14, 0x55, "22167797e487c5ad05842cee0624ea0d"}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000094}, 0x12) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') [ 2191.169236] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2191.189793] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2191.195518] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:38 executing program 2: r0 = inotify_init1(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) [ 2191.237135] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:38 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 07:26:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r2, 0x0, r2]) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001dc0)=[{{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f00000004c0)=""/237, 0xed}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000005c0)=""/139, 0x99}, {&(0x7f0000000780)=""/170, 0xfe46}, {&(0x7f0000000680)=""/78, 0x4e}, {&(0x7f0000000840)=""/67, 0x43}, {&(0x7f00000008c0)=""/172, 0xac}, {&(0x7f0000000040)=""/10, 0xa}, {&(0x7f00000001c0)}, {&(0x7f0000000980)=""/171}], 0x9}}, {{&(0x7f0000000a40), 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000000ac0)=""/217, 0xdc}, {&(0x7f0000000bc0)=""/225, 0xdd}, {&(0x7f0000002680)=""/4109, 0x285}], 0x3, &(0x7f0000001d00)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x88}}], 0x2, 0x10062, &(0x7f0000001e40)={0x0, 0x989680}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e80)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000001ec0)={{0x1, 0xffffffffffffffff, r2, 0x0, r5, 0x80, 0x6}, 0x0, 0x0, 0x4, 0x5, 0x1f4b, 0x9, 0x2, 0x200, 0xfffe, 0x1, 0xffffffffffffffff, r6}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="0400000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:38 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, 0x0) 07:26:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect(r0, &(0x7f00000000c0)=@generic={0x0, "edf2ff68ccd1506a5827bbe7e5249213e8ed64574e649a588059244ada7a5284d7d3dec15be8d2774df4c3c5c75f61b65f4e9155529ea045929990a90284fb806f6fc1461b078c97a3fb708e486ad8605715fb0a7209731e3c221621f0b426a370fac1a83ec048bbfc25cfb2f56e65fa6ad644aaabcb1f1b4fae321cd25e"}, 0xfffffe01) 07:26:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf700) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2191.504578] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) r0 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a6000000000000000009000000008000"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) r4 = open(0x0, 0x149842, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000480)={0x58, r0, 0x20, 0x0, 0x0, {0xb}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40004}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, r5, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0xd}}]}, 0x40}, 0x1, 0x0, 0x0, 0x48000}, 0x4801) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r3], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="200000ea6101ab0000043b780500000000000000000000070000000000000000000000f7842f911a186c0e"], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) r3 = socket(0x6, 0x3, 0x9) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x401, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1f}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x900000}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40005}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') [ 2191.707663] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2191.787381] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="0f00000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf800) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2192.077603] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2192.172462] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2192.233051] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="1000000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xf900) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2192.481308] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2192.591014] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2192.603571] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2192.634844] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2192.647164] device bridge_slave_1 left promiscuous mode [ 2192.655733] bridge0: port 2(bridge_slave_1) entered disabled state [ 2192.727470] device bridge_slave_0 left promiscuous mode 07:26:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="1300000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x7, &(0x7f0000000200)=[{&(0x7f00000004c0)="200000000002000019000000000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b000000000400000814fef7b41da531be5d7d61566b000000d2c2000012035f07102255faee1daf2241877f59da54c72217990e5c61237997d3a07430b199d14f860bd31ff9e4b3aa6de4d2a1ecf481f6e63bdb589189", 0xa8, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x9}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000580)="ed41000000101bfe561c3d66d3d94f255e68f99adb0000daf4655fdbf4655fdbf4655f000000000000040080007fb90eceec75281b7221925786a892f1d0c4f6733f01c9a9bd6eabf128938d1703000000000000007756b6be6bf668e90bcf8896e188c7ba6b9d02b24e44d6c7ffa7cc7e80d313edcb5f57a4c750c4d5fb75703b329c818f381a777df8c46fdb8491e96ab2fa9209b9c540a8", 0x99, 0x43fe}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x1040000, &(0x7f00000001c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x269}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r2 = socket$inet6(0xa, 0x0, 0x80000003) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r3 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r3, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, r1, 0x0) getgid() r4 = getpid() setsockopt$sock_int(r2, 0x1, 0x29, &(0x7f0000000040)=0x2, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) getgroups(0x1, &(0x7f00000001c0)=[0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, 0x0, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r4}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2192.767978] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfa00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2192.831832] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2193.022465] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 07:26:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfb00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2193.399497] device bridge_slave_1 left promiscuous mode [ 2193.408681] bridge0: port 2(bridge_slave_1) entered disabled state [ 2193.437564] device bridge_slave_0 left promiscuous mode [ 2193.443110] bridge0: port 1(bridge_slave_0) entered disabled state [ 2193.548248] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2193.653383] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfc00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2194.099825] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2194.164144] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2195.883610] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2195.890400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2195.899341] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2195.906342] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2195.917575] device veth1_macvtap left promiscuous mode [ 2195.922946] device veth0_macvtap left promiscuous mode [ 2195.928874] device veth1_vlan left promiscuous mode [ 2195.935050] device veth0_vlan left promiscuous mode [ 2198.213987] Bluetooth: hci3: command 0x0409 tx timeout [ 2200.224080] device hsr_slave_1 left promiscuous mode [ 2200.232738] device hsr_slave_0 left promiscuous mode [ 2200.252387] team0 (unregistering): Port device team_slave_1 removed [ 2200.262467] team0 (unregistering): Port device team_slave_0 removed [ 2200.273144] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2200.286588] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2200.293731] Bluetooth: hci3: command 0x041b tx timeout [ 2200.323610] bond0 (unregistering): Released all slaves [ 2200.338270] IPVS: ftp: loaded support on port[0] = 21 [ 2200.436476] chnl_net:caif_netlink_parms(): no params data found [ 2200.514894] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.521452] bridge0: port 1(bridge_slave_0) entered disabled state [ 2200.530987] device bridge_slave_0 entered promiscuous mode [ 2200.540518] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.547992] bridge0: port 2(bridge_slave_1) entered disabled state [ 2200.556659] device bridge_slave_1 entered promiscuous mode [ 2200.584587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2200.595204] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2200.628219] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2200.636210] team0: Port device team_slave_0 added [ 2200.642004] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2200.650435] team0: Port device team_slave_1 added [ 2200.674859] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2200.681169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2200.707102] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2200.721717] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2200.728448] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2200.754378] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2200.766671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2200.775485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2200.803458] device hsr_slave_0 entered promiscuous mode [ 2200.809869] device hsr_slave_1 entered promiscuous mode [ 2200.818539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2200.827383] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2200.962910] bridge0: port 2(bridge_slave_1) entered blocking state [ 2200.969345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2200.976072] bridge0: port 1(bridge_slave_0) entered blocking state [ 2200.982430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.040557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2201.051710] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2201.063342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2201.072134] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.080398] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.094932] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2201.101183] 8021q: adding VLAN 0 to HW filter on device team0 [ 2201.116054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2201.125151] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.131516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.156099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2201.165462] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.171834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.181308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2201.206190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2201.219733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2201.228362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2201.247581] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2201.268582] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2201.279473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2201.290127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2201.320984] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2201.331626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2201.347808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2201.365326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2201.384454] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2201.396609] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2201.404329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2201.413493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2201.485656] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2201.493042] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2201.501984] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2201.516960] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2201.523934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2201.531553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2201.544137] device veth0_vlan entered promiscuous mode [ 2201.556380] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2201.568783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2201.581865] device veth1_vlan entered promiscuous mode [ 2201.589508] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2201.600881] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2201.616331] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2201.627947] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2201.635241] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2201.642680] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2201.652815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2201.668894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2201.682779] device veth0_macvtap entered promiscuous mode [ 2201.690659] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2201.702131] device veth1_macvtap entered promiscuous mode [ 2201.708824] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2201.719179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2201.730487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2201.740400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.750578] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.759861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.769723] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.778948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.788835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.798073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.807916] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.817460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2201.827349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2201.838027] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2201.845428] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2201.852951] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2201.860572] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2201.868145] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2201.876261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2202.075142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.085217] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.095310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.105252] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.114562] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.124481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.133883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.143808] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.152920] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2202.162826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2202.173121] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2202.181358] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2202.189059] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2202.197154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2202.373861] Bluetooth: hci3: command 0x040f tx timeout [ 2202.642863] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2202.763951] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2202.775956] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2202.796021] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2202.810039] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2202.818662] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2202.825915] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2202.928987] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2203.079833] device bridge_slave_1 left promiscuous mode [ 2203.086424] bridge0: port 2(bridge_slave_1) entered disabled state [ 2203.112295] device bridge_slave_0 left promiscuous mode [ 2203.118890] bridge0: port 1(bridge_slave_0) entered disabled state 07:26:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f00000000000004008000", 0x1e, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1f}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) msgget$private(0x0, 0x422) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80001000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff77ffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, r1, 0x0, r1]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="980e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="c00e000030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) 07:26:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xed00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x8000, 0x6) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r4], 0x20}}, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x20000080) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x80) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="200000ea61010000043b780500001f000000a60000000700"/34], &(0x7f0000000440), 0x0) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000b00)={0x1588, 0xd, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1574, 0x3, 0x0, 0x1, [{0x270, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_KEY={0x1a0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x69, 0x1, "2e39f407cc5ce2529280b48811a9c2aa8a150285ba5fb70c67e5db03ed595a422f19cacb9786e20864877259837ccb4a15a3ec91f6f2d16860a83f416d1b7a9ee2dbb8e17bff01a1a97716b459b2a0f4c6aedbbf29edb0ff68f7a29b3899b3d8fb575df7f4"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x94, 0x1, "219f4c3f92d685feff8a579526561c70a73f2f41f717f3822af8abd6076b1c02825b4ee70c4b814802041ebe23f277db9341e46e0d5070926a07bd030d730fa1951dad9561bc28afb6441c491c908bb54c5759ebcd0db90dc218263d73b047c954e3e37388223e4473d6a4994b33d5cd465a40fc49a0bc213d9144fadc6ba42de4aca65ab295da57087a9bad444a9f04"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_KEY_END={0xa0, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x1a, 0x1, "942ffd27952715a181d83f30f77347c8ef9ce6204a5e"}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000001}]}, {0x12d8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_USERDATA={0x60, 0x6, 0x1, 0x0, "cfcc87d945a10eb22e8140908f6f3ecfb7ffae58ae8c2926a5057f1b6de2cd34769a3bb9a3454a7cecc61e7604a40e423555c4eb1e8f2a329fdd3b9ce5fe4f1a3f4bee03c1f56b1744025ab1eb9f5e4ee07bde3c6f909365fe434373"}, @NFTA_SET_ELEM_KEY={0x112c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0xbd, 0x1, "89bb18403cb809ec18ab1b6bbddac949fd06061c21cd61f91ad833ed5b2e054a09abdd5c8ad011f13ce02d228fb176e9fcfdc0c3a278573708bf1a48373a36f3fc29d56042592ce9aff9e59d111a17699e0f33d799ea627ecfe01c6d41dfa6f0b925728019e77e4495c9e19cfc39cb1a513ef87f749fa37ecb4495beb6333cddc9afcf46b5636884a941849e7a65a4668a85fa001c129038ab7790ae33f6726d5b56db0cc6e1d3dd9a7d4f117e6b7d77ab14d5164f37451ca2"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_DATA={0x13c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0xb1, 0x1, "921fcb3eb52a1879876f574f2e2f9caa4c8ac323f8b5bf842e820f490b81af386eab8d0416757b61efcd96ac2c922ff0aff66e2fa1e96a5d031fe5633479c6fd31a057eaf7cde5a46bde6e185110082bcf07a07818a0418771ee61d7719ba13eb61728847304967aa5c8d7b1d34c068b3fdb34e5434e0aa90c9a9449b8361dcbc50eae7cb141462aced6e6830576d42396adf481d62e2bf9e0674f25311811901a4fcb0ab370886f7571efc605"}, @NFTA_DATA_VALUE={0x7d, 0x1, "579ee81c20c985b7c53f90ab5277ff39697c7cc16ac0b841ebd0d6d007cf4db9419d5662fe036bc9c71d496bcc0a4ac63f42c72a16f59b6d0c4513a9cb4761759b7849205acff6d9fd6c54145c1773b7f1df8cf5998399bc5bb86164a3e527543afce1fa5f2b95dc0bac6726d879e52f9370857c1cffe339cc"}]}]}, {0x28, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}]}]}]}, 0x1588}, 0x1, 0x0, 0x0, 0x8000}, 0x20002011) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100002, 0x4, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x83fd}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r2], 0x20}}, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000002c0)={0x80000001, 0x5, {0x0}, {0xee01}, 0x62c, 0x6}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@RTM_NEWNSID={0x24, 0x58, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NETNSA_PID={0x8}, @NETNSA_PID={0x8, 0x2, r3}]}, 0x24}}, 0x40001) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000240)='ubifs\x00', 0x20000, &(0x7f0000000280)='\x00') 07:26:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfd00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2204.055860] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2204.071409] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2204.231553] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfe00) sendmsg$nl_route_sched(r0, 0x0, 0x0) 07:26:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="e03f030030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2204.431634] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2204.489839] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xff00) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2204.649979] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="d831002030003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2204.849299] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2204.977104] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xffe0) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2205.125245] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2205.205178] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 07:26:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="00f0ff7f30003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2205.325594] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2205.401621] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r3, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r2}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0xfff0) sendmsg$nl_route_sched(r0, 0x0, 0x0) [ 2205.502722] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 07:26:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x181, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x92) r1 = msgget$private(0x0, 0x422) msgctl$MSG_STAT_ANY(r1, 0xd, 0x0) msgsnd(0x0, &(0x7f00000004c0)=ANY=[], 0x401, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = getgid() r3 = getpid() getgroups(0x4, &(0x7f00000000c0)=[0xffffffffffffffff, 0x0, 0x0, r2]) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x0, 0xee01, r4, 0x0, 0x0, 0x0, 0xe063}, 0x0, 0x0, 0x0, 0xffffffff, 0x3f, 0x0, 0x7, 0x8, 0xeb, 0x0, r3}) msgctl$IPC_SET(0x0, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002340)=ANY=[@ANYBLOB="effdffff30003dfa000000000000000000000000840e0100800e01000a0001007065646974000000540e0280500e0200000000000000000000000000000000000000000097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000000000000000000000000000000f58a972c3c88eb5afa3b09fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005d7fdc60260942601236000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009321000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/790], 0xe98}}, 0x0) [ 2205.705043] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2205.731274] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2205.867085] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 2206.315199] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2206.321973] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2206.341682] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2206.350561] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2206.369320] device veth1_macvtap left promiscuous mode [ 2206.382233] device veth0_macvtap left promiscuous mode [ 2206.389172] device veth1_vlan left promiscuous mode [ 2206.398534] device veth0_vlan left promiscuous mode [ 2210.612924] Bluetooth: hci3: command 0x0409 tx timeout [ 2210.730187] device hsr_slave_1 left promiscuous mode [ 2210.737849] device hsr_slave_0 left promiscuous mode [ 2210.755989] team0 (unregistering): Port device team_slave_1 removed [ 2210.767510] team0 (unregistering): Port device team_slave_0 removed [ 2210.778763] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2210.790558] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2210.823822] bond0 (unregistering): Released all slaves [ 2210.837521] IPVS: ftp: loaded support on port[0] = 21 [ 2210.938656] chnl_net:caif_netlink_parms(): no params data found [ 2211.022661] bridge0: port 1(bridge_slave_0) entered blocking state [ 2211.030466] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.039593] device bridge_slave_0 entered promiscuous mode [ 2211.049214] bridge0: port 2(bridge_slave_1) entered blocking state [ 2211.056646] bridge0: port 2(bridge_slave_1) entered disabled state [ 2211.065670] device bridge_slave_1 entered promiscuous mode [ 2211.095002] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2211.107226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2211.134374] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2211.141990] team0: Port device team_slave_0 added [ 2211.149812] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2211.158931] team0: Port device team_slave_1 added [ 2211.185329] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2211.191610] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2211.218307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2211.233138] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2211.239647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2211.267306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2211.280346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2211.291670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2211.320879] device hsr_slave_0 entered promiscuous mode [ 2211.327787] device hsr_slave_1 entered promiscuous mode [ 2211.335907] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2211.344841] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2211.471541] bridge0: port 2(bridge_slave_1) entered blocking state [ 2211.477974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2211.484696] bridge0: port 1(bridge_slave_0) entered blocking state [ 2211.491052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2211.569351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2211.581485] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2211.601307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2211.610685] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.621913] bridge0: port 2(bridge_slave_1) entered disabled state [ 2211.640016] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2211.647339] 8021q: adding VLAN 0 to HW filter on device team0 [ 2211.662257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2211.671955] bridge0: port 1(bridge_slave_0) entered blocking state [ 2211.678461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2211.696928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2211.705433] bridge0: port 2(bridge_slave_1) entered blocking state [ 2211.711896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2211.734987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2211.743898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2211.761585] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2211.772147] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2211.784450] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2211.791812] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2211.800828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2211.810132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2211.827744] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2211.835217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2211.844394] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2211.853528] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2211.860400] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2211.873520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2211.894241] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 2211.910244] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 2211.921061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2211.935411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2212.011396] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 2212.019324] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 2212.028572] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 2212.043223] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 2212.050225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2212.059143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2212.070871] device veth0_vlan entered promiscuous mode [ 2212.080417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2212.087932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2212.109764] device veth1_vlan entered promiscuous mode [ 2212.117755] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 2212.136843] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 2212.158676] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 2212.169980] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 2212.178619] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2212.187083] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2212.195128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2212.203931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2212.214409] device veth0_macvtap entered promiscuous mode [ 2212.221212] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 2212.231757] device veth1_macvtap entered promiscuous mode [ 2212.238569] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 2212.250323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 2212.446951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 2212.456667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2212.468003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.477743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2212.488132] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.497804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2212.508084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.518691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2212.528519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.537702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2212.547485] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.557733] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 2212.565534] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2212.572571] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2212.580203] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2212.587614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2212.596008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2212.701053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2212.703381] Bluetooth: hci3: command 0x041b tx timeout [ 2212.711108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.725556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2212.735360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.744563] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2212.754338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.763531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2212.773313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.782423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2212.792265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2212.802767] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 2212.809706] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2212.818016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2212.826257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2213.240747] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 2213.248548] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.261147] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2213.281425] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2213.394896] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 2213.401935] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.412934] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2213.419705] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2213.566183] device bridge_slave_1 left promiscuous mode [ 2213.573637] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.591870] device bridge_slave_0 left promiscuous mode [ 2213.599427] bridge0: port 1(bridge_slave_0) entered disabled state [ 2215.076956] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2215.085001] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2215.092972] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2215.099718] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2215.110143] device veth1_macvtap left promiscuous mode [ 2215.115837] device veth0_macvtap left promiscuous mode [ 2215.121165] device veth1_vlan left promiscuous mode [ 2215.126320] device veth0_vlan left promiscuous mode [ 2219.379506] device hsr_slave_1 left promiscuous mode [ 2219.387170] device hsr_slave_0 left promiscuous mode [ 2219.405144] team0 (unregistering): Port device team_slave_1 removed [ 2219.415367] team0 (unregistering): Port device team_slave_0 removed [ 2219.427456] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2219.437539] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2219.470642] bond0 (unregistering): Released all slaves [ 2221.869707] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2221.876516] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2221.885231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2221.892748] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2221.904690] device veth1_macvtap left promiscuous mode [ 2221.910020] device veth0_macvtap left promiscuous mode [ 2221.916540] device veth1_vlan left promiscuous mode [ 2221.921793] device veth0_vlan left promiscuous mode [ 2222.933993] ieee802154 phy0 wpan0: encryption failed: -22 [ 2222.939572] ieee802154 phy1 wpan1: encryption failed: -22 [ 2226.114536] device hsr_slave_1 left promiscuous mode [ 2226.123352] device hsr_slave_0 left promiscuous mode [ 2226.145734] team0 (unregistering): Port device team_slave_1 removed [ 2226.155155] team0 (unregistering): Port device team_slave_0 removed [ 2226.167837] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2226.179290] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2226.212855] bond0 (unregistering): Released all slaves [ 2284.368141] ieee802154 phy0 wpan0: encryption failed: -22 [ 2284.373726] ieee802154 phy1 wpan1: encryption failed: -22 [ 2345.803336] ieee802154 phy0 wpan0: encryption failed: -22 [ 2345.809036] ieee802154 phy1 wpan1: encryption failed: -22 [ 2347.092158] INFO: task syz-executor.2:18134 blocked for more than 140 seconds. [ 2347.099556] Not tainted 4.19.211-syzkaller #0 [ 2347.104642] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2347.112817] syz-executor.2 D28016 18134 9633 0x00000004 [ 2347.118521] Call Trace: [ 2347.121157] __schedule+0x887/0x2040 [ 2347.125073] ? io_schedule_timeout+0x140/0x140 [ 2347.129757] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 2347.135007] schedule+0x8d/0x1b0 [ 2347.138475] request_wait_answer+0x3dc/0x750 [ 2347.143056] ? flush_bg_queue+0x390/0x390 [ 2347.147266] ? wait_woken+0x250/0x250 [ 2347.151170] __fuse_request_send+0x123/0x1c0 [ 2347.155715] fuse_simple_request+0x2e6/0x820 [ 2347.160183] fuse_setxattr+0x1e8/0x340 [ 2347.164424] ? no_xattr_set+0x10/0x10 [ 2347.168301] ? __lock_acquire+0x6de/0x3ff0 [ 2347.172677] ? check_preemption_disabled+0x41/0x280 [ 2347.177797] ? fuse_removexattr+0x2c0/0x2c0 [ 2347.182261] fuse_xattr_set+0x38/0x70 [ 2347.186118] __vfs_setxattr+0x10e/0x170 [ 2347.190180] ? xattr_resolve_name+0x3d0/0x3d0 [ 2347.194809] ? evm_protect_xattr.constprop.0+0x99/0x3d0 [ 2347.200240] __vfs_setxattr_noperm+0x11a/0x420 [ 2347.205034] __vfs_setxattr_locked+0x176/0x250 [ 2347.209699] vfs_setxattr+0xe5/0x270 [ 2347.213610] ? __vfs_setxattr_locked+0x250/0x250 [ 2347.218472] ? strncpy_from_user+0x2a2/0x350 [ 2347.223040] setxattr+0x23d/0x330 [ 2347.226551] ? vfs_setxattr+0x270/0x270 [ 2347.230619] ? filename_lookup+0x3d5/0x5a0 [ 2347.235019] ? __phys_addr_symbol+0x2c/0x70 [ 2347.239413] ? __check_object_size+0x17b/0x3e0 [ 2347.244201] ? check_preemption_disabled+0x41/0x280 [ 2347.249328] ? preempt_count_add+0xaf/0x190 [ 2347.253791] ? __mnt_want_write+0x22c/0x2c0 [ 2347.258214] path_setxattr+0x170/0x190 [ 2347.262244] ? __se_sys_fsetxattr+0x1b0/0x1b0 [ 2347.266808] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2347.272357] __x64_sys_lsetxattr+0xbd/0x150 [ 2347.276751] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2347.281374] do_syscall_64+0xf9/0x620 [ 2347.285348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.290605] RIP: 0033:0x7f9ce28eba39 [ 2347.294441] Code: Bad RIP value. [ 2347.297895] RSP: 002b:00007f9cdfe61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2347.305845] RAX: ffffffffffffffda RBX: 00007f9ce29eef60 RCX: 00007f9ce28eba39 [ 2347.313240] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000180 [ 2347.320684] RBP: 00007f9ce2945e8f R08: 0000000000000000 R09: 0000000000000000 [ 2347.328150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2347.335572] R13: 00007ffd65ea616f R14: 00007f9cdfe61300 R15: 0000000000022000 [ 2347.343114] INFO: task syz-executor.2:18157 blocked for more than 140 seconds. [ 2347.350555] Not tainted 4.19.211-syzkaller #0 [ 2347.355697] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2347.363912] syz-executor.2 D28992 18157 9633 0x00000004 [ 2347.370453] Call Trace: [ 2347.373406] __schedule+0x887/0x2040 [ 2347.377201] ? io_schedule_timeout+0x140/0x140 [ 2347.381907] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 2347.387148] schedule+0x8d/0x1b0 [ 2347.390575] request_wait_answer+0x3dc/0x750 [ 2347.395122] ? flush_bg_queue+0x390/0x390 [ 2347.399390] ? wait_woken+0x250/0x250 [ 2347.403391] __fuse_request_send+0x123/0x1c0 [ 2347.407873] fuse_simple_request+0x2e6/0x820 [ 2347.412466] fuse_setxattr+0x1e8/0x340 [ 2347.416429] ? no_xattr_set+0x10/0x10 [ 2347.420276] ? __lock_acquire+0x6de/0x3ff0 [ 2347.424693] ? check_preemption_disabled+0x41/0x280 [ 2347.429802] ? fuse_removexattr+0x2c0/0x2c0 [ 2347.434257] fuse_xattr_set+0x38/0x70 [ 2347.438161] __vfs_setxattr+0x10e/0x170 [ 2347.442289] ? xattr_resolve_name+0x3d0/0x3d0 [ 2347.446851] ? evm_protect_xattr.constprop.0+0x99/0x3d0 [ 2347.452404] __vfs_setxattr_noperm+0x11a/0x420 [ 2347.457073] __vfs_setxattr_locked+0x176/0x250 [ 2347.461707] vfs_setxattr+0xe5/0x270 [ 2347.465608] ? __vfs_setxattr_locked+0x250/0x250 [ 2347.471288] ? strncpy_from_user+0x2a2/0x350 [ 2347.475894] setxattr+0x23d/0x330 [ 2347.479424] ? vfs_setxattr+0x270/0x270 [ 2347.483525] ? filename_lookup+0x3d5/0x5a0 [ 2347.487880] ? __phys_addr_symbol+0x2c/0x70 [ 2347.492377] ? __check_object_size+0x17b/0x3e0 [ 2347.497033] ? check_preemption_disabled+0x41/0x280 [ 2347.502260] ? preempt_count_add+0xaf/0x190 [ 2347.506671] ? __mnt_want_write+0x22c/0x2c0 [ 2347.511044] path_setxattr+0x170/0x190 [ 2347.515111] ? __se_sys_fsetxattr+0x1b0/0x1b0 [ 2347.519884] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2347.525484] __x64_sys_lsetxattr+0xbd/0x150 [ 2347.529905] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2347.534636] do_syscall_64+0xf9/0x620 [ 2347.538585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.543958] RIP: 0033:0x7f9ce28eba39 [ 2347.547731] Code: Bad RIP value. [ 2347.551285] RSP: 002b:00007f9cdfe61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2347.559140] RAX: ffffffffffffffda RBX: 00007f9ce29eef60 RCX: 00007f9ce28eba39 [ 2347.566594] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000180 [ 2347.574997] RBP: 00007f9ce2945e8f R08: 0000000000000000 R09: 0000000000000000 [ 2347.582641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2347.590027] R13: 00007ffd65ea616f R14: 00007f9cdfe61300 R15: 0000000000022000 [ 2347.597482] INFO: task syz-executor.2:18461 blocked for more than 140 seconds. [ 2347.604992] Not tainted 4.19.211-syzkaller #0 [ 2347.610101] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2347.618220] syz-executor.2 D28568 18461 9633 0x00000004 [ 2347.623998] Call Trace: [ 2347.626691] __schedule+0x887/0x2040 [ 2347.630473] ? io_schedule_timeout+0x140/0x140 [ 2347.635181] ? prepare_to_wait_exclusive+0x2d0/0x2d0 [ 2347.640438] schedule+0x8d/0x1b0 [ 2347.644023] request_wait_answer+0x3dc/0x750 [ 2347.648498] ? flush_bg_queue+0x390/0x390 [ 2347.652832] ? wait_woken+0x250/0x250 [ 2347.656728] __fuse_request_send+0x123/0x1c0 [ 2347.661191] fuse_simple_request+0x2e6/0x820 [ 2347.665764] fuse_setxattr+0x1e8/0x340 [ 2347.669725] ? no_xattr_set+0x10/0x10 [ 2347.673645] ? __lock_acquire+0x6de/0x3ff0 [ 2347.678674] ? check_preemption_disabled+0x41/0x280 [ 2347.683939] ? fuse_removexattr+0x2c0/0x2c0 [ 2347.688364] fuse_xattr_set+0x38/0x70 [ 2347.692293] __vfs_setxattr+0x10e/0x170 [ 2347.696328] ? xattr_resolve_name+0x3d0/0x3d0 [ 2347.700943] ? evm_protect_xattr.constprop.0+0x99/0x3d0 [ 2347.706483] __vfs_setxattr_noperm+0x11a/0x420 [ 2347.711150] __vfs_setxattr_locked+0x176/0x250 [ 2347.715945] vfs_setxattr+0xe5/0x270 [ 2347.719760] ? __vfs_setxattr_locked+0x250/0x250 [ 2347.724658] ? strncpy_from_user+0x2a2/0x350 [ 2347.729180] setxattr+0x23d/0x330 [ 2347.732784] ? vfs_setxattr+0x270/0x270 [ 2347.736822] ? filename_lookup+0x3d5/0x5a0 [ 2347.741160] ? __phys_addr_symbol+0x2c/0x70 [ 2347.745643] ? __check_object_size+0x17b/0x3e0 [ 2347.750297] ? check_preemption_disabled+0x41/0x280 [ 2347.755499] ? preempt_count_add+0xaf/0x190 [ 2347.759907] ? __mnt_want_write+0x22c/0x2c0 [ 2347.764378] path_setxattr+0x170/0x190 [ 2347.768377] ? __se_sys_fsetxattr+0x1b0/0x1b0 [ 2347.773065] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2347.779401] __x64_sys_lsetxattr+0xbd/0x150 [ 2347.783969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2347.788643] do_syscall_64+0xf9/0x620 [ 2347.792736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.798023] RIP: 0033:0x7f9ce28eba39 [ 2347.801872] Code: Bad RIP value. [ 2347.805313] RSP: 002b:00007f9cdfe61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2347.813235] RAX: ffffffffffffffda RBX: 00007f9ce29eef60 RCX: 00007f9ce28eba39 [ 2347.820602] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000020000180 [ 2347.828012] RBP: 00007f9ce2945e8f R08: 0000000000000000 R09: 0000000000000000 [ 2347.835496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2347.842939] R13: 00007ffd65ea616f R14: 00007f9cdfe61300 R15: 0000000000022000 [ 2347.850304] [ 2347.850304] Showing all locks held in the system: [ 2347.856814] 1 lock held by khungtaskd/1570: [ 2347.861209] #0: 0000000049da83e6 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 2347.869993] 1 lock held by in:imklog/7824: [ 2347.874407] #0: 00000000f2fcb83a (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 [ 2347.883511] 4 locks held by rs:main Q:Reg/7825: [ 2347.888297] 2 locks held by syz-executor.2/18134: [ 2347.893276] #0: 000000003c890499 (sb_writers#25){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 2347.901423] #1: 00000000a6628ecf (&type->i_mutex_dir_key#9){++++}, at: vfs_setxattr+0xc7/0x270 [ 2347.910559] 2 locks held by syz-executor.2/18157: [ 2347.915559] #0: 00000000da02cb31 (sb_writers#25){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 2347.923697] #1: 0000000087a5d421 (&type->i_mutex_dir_key#9){++++}, at: vfs_setxattr+0xc7/0x270 [ 2347.932776] 2 locks held by syz-executor.2/18461: [ 2347.937702] #0: 00000000c400a286 (sb_writers#25){.+.+}, at: mnt_want_write+0x3a/0xb0 [ 2347.945827] #1: 00000000ea8a431f (&type->i_mutex_dir_key#9){++++}, at: vfs_setxattr+0xc7/0x270 [ 2347.954863] [ 2347.956557] ============================================= [ 2347.956557] [ 2347.963734] NMI backtrace for cpu 0 [ 2347.967463] CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 2347.974928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2347.984269] Call Trace: [ 2347.986853] dump_stack+0x1fc/0x2ef [ 2347.990467] nmi_cpu_backtrace.cold+0x63/0xa2 [ 2347.994948] ? lapic_can_unplug_cpu+0x80/0x80 [ 2347.999429] nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 [ 2348.004690] watchdog+0x991/0xe60 [ 2348.008129] ? reset_hung_task_detector+0x30/0x30 [ 2348.012952] kthread+0x33f/0x460 [ 2348.016297] ? kthread_park+0x180/0x180 [ 2348.020255] ret_from_fork+0x24/0x30 [ 2348.024873] Sending NMI from CPU 0 to CPUs 1: [ 2348.030189] NMI backtrace for cpu 1 [ 2348.030195] CPU: 1 PID: 7825 Comm: rs:main Q:Reg Not tainted 4.19.211-syzkaller #0 [ 2348.030202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2348.030206] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 [ 2348.030217] Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 [ 2348.030221] RSP: 0018:ffff88808fb77908 EFLAGS: 00000293 [ 2348.030228] RAX: ffff88808fb780c0 RBX: ffff888235090c80 RCX: ffffffff81d933c8 [ 2348.030233] RDX: 0000000000000000 RSI: ffffffff81d92be5 RDI: ffff888235090c80 [ 2348.030238] RBP: ffff888235090c80 R08: 0000000000000000 R09: 0000000000000000 [ 2348.030243] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 [ 2348.030248] R13: ffff888235091300 R14: dffffc0000000000 R15: 0000000000346000 [ 2348.030254] FS: 00007f6e668b0700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 2348.030258] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2348.030263] CR2: 00007f496179f000 CR3: 00000000aae74000 CR4: 00000000003406e0 [ 2348.030268] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2348.030273] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2348.030276] Call Trace: [ 2348.030280] ext4_journal_check_start+0x15/0x220 [ 2348.030284] __ext4_journal_start_sb+0x8e/0x3f0 [ 2348.030287] ? ext4_da_write_begin+0x3f7/0x10e0 [ 2348.030291] ext4_da_write_begin+0x3f7/0x10e0 [ 2348.030295] ? __generic_write_end+0x184/0x300 [ 2348.030299] ? ext4_write_begin+0x1610/0x1610 [ 2348.030302] ? iov_iter_init+0x1d0/0x1d0 [ 2348.030306] ? iov_iter_advance+0x210/0xdb0 [ 2348.030309] generic_perform_write+0x1f8/0x4d0 [ 2348.030313] ? __mnt_drop_write_file+0x6f/0xa0 [ 2348.030317] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 2348.030320] ? current_time+0x1c0/0x1c0 [ 2348.030324] ? lock_acquire+0x170/0x3c0 [ 2348.030327] __generic_file_write_iter+0x24b/0x610 [ 2348.030331] ext4_file_write_iter+0x2fe/0xf20 [ 2348.030335] ? ext4_file_open+0x600/0x600 [ 2348.030338] ? do_futex+0x171/0x1880 [ 2348.030341] ? mark_held_locks+0xf0/0xf0 [ 2348.030345] ? __fdget_pos+0x26f/0x310 [ 2348.030348] __vfs_write+0x51b/0x770 [ 2348.030352] ? kernel_read+0x110/0x110 [ 2348.030355] ? check_preemption_disabled+0x41/0x280 [ 2348.030360] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2348.030363] vfs_write+0x1f3/0x540 [ 2348.030366] ksys_write+0x12b/0x2a0 [ 2348.030370] ? __ia32_sys_read+0xb0/0xb0 [ 2348.030374] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2348.030377] ? do_syscall_64+0x21/0x620 [ 2348.030380] do_syscall_64+0xf9/0x620 [ 2348.030384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2348.030388] RIP: 0033:0x7f6e692f41cd [ 2348.030399] Code: c2 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ae fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 f7 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2348.030403] RSP: 002b:00007f6e668af590 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2348.030411] RAX: ffffffffffffffda RBX: 00007f6e5c023fb0 RCX: 00007f6e692f41cd [ 2348.030416] RDX: 00000000000006eb RSI: 00007f6e5c023fb0 RDI: 0000000000000006 [ 2348.030421] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2348.030426] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f6e5c023d30 [ 2348.030431] R13: 00007f6e668af5b0 R14: 0000560f152cb360 R15: 00000000000006eb [ 2348.030677] Kernel panic - not syncing: hung_task: blocked tasks [ 2348.357143] CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 [ 2348.364566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2348.373900] Call Trace: [ 2348.376491] dump_stack+0x1fc/0x2ef [ 2348.380103] panic+0x26a/0x50e [ 2348.383278] ? __warn_printk+0xf3/0xf3 [ 2348.387167] ? lapic_can_unplug_cpu+0x80/0x80 [ 2348.391645] ? ___preempt_schedule+0x16/0x18 [ 2348.396042] ? watchdog+0x991/0xe60 [ 2348.399651] ? nmi_trigger_cpumask_backtrace+0x15e/0x1f0 [ 2348.405100] watchdog+0x9a2/0xe60 [ 2348.408542] ? reset_hung_task_detector+0x30/0x30 [ 2348.413367] kthread+0x33f/0x460 [ 2348.416713] ? kthread_park+0x180/0x180 [ 2348.420676] ret_from_fork+0x24/0x30 [ 2348.424873] Kernel Offset: disabled [ 2348.428504] Rebooting in 86400 seconds..